The Beginning
It started with curiosity; how do systems pwn? Gathering infos by passive recon. I focus on understanding the ”what” and ”why” while delegating the ”how” to AI tools, with line-by-line understanding. I began turning those questions into practical research. Every vulnerability I discovered became a part of that exploration.