I’ve led teams and taken point on a wide range of technical projects, handling everything from planning and architecture to development and delivery. Most of my work blends automation, security, AI, and full-stack engineering, and I’ve been the one coordinating people, keeping the project on track, and shipping the final product.
Projects I’ve led include:
- SwiftSolvency – communication engine for insolvency/finance
- AttackEngine (acquired) – anti-DDoS and server defense platform
- Remimic – AI face-swap + backend infrastructure
- Automated lead scraper + AI outreach system
- Social media automation suite
- XAir Technologies web platform build
- FiveM anti-cheat engine
- Multiple CTF challenge machines (XXE, crypto, IDOR)
- ML-powered price monitoring software
- Parrot CTFs CTF platform development
0
7
I built a fully automated fulfillment workflow that eliminated all manual order handling across my eBay store. The system takes new orders, processes them end-to-end, and completes fulfillment without human involvement. It handles intake, sourcing, purchasing, status updates, and notifications in a single automated pipeline.
By removing repetitive operational steps, I was able to scale quickly and focus on growth rather than admin work. This automation directly supported the store securing over $10,000 in orders within the first two months of launch, with near-zero day-to-day intervention required on my end.
10
103
I developed a SaaS communication engine tailored for the insolvency and finance sectors. This platform streamlines email and SMS campaigns, enhancing client engagement and driving higher conversions.
Key features include AI-driven personalization, email-open tracking, and exportable reports, all designed to improve communication efficiency and reduce the likelihood of emails landing in spam.
0
12
⚠️CVE-2024-45163: Remote DoS in Mirai Botnet (The Mirai Botnet Kill Switch)
I discovered a vulnerability in Mirai (and several variants) that makes it easy to take down the botnet’s command and control server. When the CNC receives any incoming TCP data, even random bytes or a known username like “root,” it keeps the session open while waiting for a password that never arrives.
If someone opens many of these connections at once, the server slowly burns through its resources and stops responding.
There’s no authentication required and it can be done remotely, which makes it a simple but effective way to disrupt the botnet’s operations.