Security Research

Welcome
To The
Renaissance

_

Cyber-Physical  ·  Autonomous Systems  ·  Bioinspiration
Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./ Prepare./Adapt./Regenerate./
01 Security
Domains
  • OT / ICS / Robotics / Autonomous Systems

    Industrial control systems, PLCs, SCADA, and robotic platforms. Protocol-level research across Modbus, DNP3, and EtherNet/IP. Threat modelling for cyber-physical environments including autonomous vehicles and edge-deployed robotics.

  • Network Security

    Deep packet analysis, network exploitation, and adversarial threat hunting. TCP/IP, DNS, TLS internals. APT behavioural analysis and vulnerability scanning across enterprise and industrial network stacks.

  • Web Application Security

    Application-layer vulnerability research, manual testing, and attack surface mapping. Bug bounty and coordinated disclosure.

Operations
  • Red Teaming

    Adversarial simulation, stealth and evasion, C2 frameworks, persistence mechanisms, lateral movement, and living-off-the-land techniques. The long game.

  • Penetration Testing

    Black box, grey box, and white box engagements across network, web application, and OT/ICS environments. Structured methodology from recon through reporting and remediation.

  • AI in Offensive Security

    Autonomous recon, LLM-assisted exploitation, AI-driven persistence and evasion. Adversarial attacks on ML systems embedded in cyber-physical infrastructure. How AI inference pipelines at the edge of autonomous and industrial platforms reshape the attack surface.

02 Research
I Papers
Stochastic Autonomy: Edge AI and the Principle of Emergence Technical note · DOI 10.5281/zenodo.18702809 19 FEB 2026 Stigmergic Coordination: The Environment as Memory Technical note · DOI 10.5281/zenodo.18105248 31 DEC 2025
II Essays
Loading posts...