WHO AM I.
I'm someone who builds and breaks — just to understand how things truly work. A curious mind shaped by code, networks, and the invisible layers of technology that most people never see.
I live at the intersection of cybersecurity and creativity. By day, I explore systems, vulnerabilities, and digital defenses. By night, I tell stories — through visuals, words, and frames that speak what silence cannot.
I don't just follow paths; I create my own. From building real-time cyber defense systems to experimenting with embedded devices and ethical hacking labs, I turn ideas into something tangible — something real.
But beyond the technical side, I'm deeply driven by emotion and storytelling. I see meaning in moments, beauty in details, and stories in everything around me.
I believe growth comes from curiosity, discipline, and the courage to step into the unknown. And no matter what I build — whether it's a system, a story, or a vision — it always reflects one thing:
// MANIFESTO I'm not here to just exist.
I'm here to understand, to create, and to leave behind something that matters.
THE PATH
MSc Cybersecurity · London
Studying offensive security, secure systems design, and applied ML for cyber-defense. Capstone in progress.
PatchPilot v2 · Production AI Sec Platform
Six-stage agent pipeline running on a Raspberry Pi. FastAPI/SSE backend, local LLM, RAG over CWE/OWASP knowledge base.
Hacker's Backpack Kit · Field Operator Build
Pi 4 (Kali) + Pi Zero 2 W + ESP32 Marauder + NRF + PN532 + AC600. Portable, battery-powered, fully self-contained.
Project AirGuard · Drone Pollution AI
Vehicle classification model (fuel vs EV) running on edge. Real-time CO/AQI telemetry over MQTT. Pi-based payload.
First Pi · First Lab
Started with AdGuard, PiVPN, then a Wi-Fi pen-test lab against my own gear. Everything since has been on this foundation.
THREE RULES
How I decide what to build and how to spend my time.
BUILD TO LEARN
Theory is bait. The only way I retain a concept is to build it end-to-end — write the parser, solder the board, deploy the service, watch it fail.
SHOW PROOF
Talk is cheap. Repos, build logs, screenshots, network traces, container manifests — that's the receipt. If it isn't shippable, it isn't real.
TECHNICAL × CREATIVE
Cybersec is half craft, half storytelling. The same instinct that drives a screenplay drives a good detection rule — find the pattern, frame the truth.