_
Industrial control systems, PLCs, SCADA, and robotic platforms. Protocol-level research across Modbus, DNP3, and EtherNet/IP. Threat modelling for cyber-physical environments including autonomous vehicles and edge-deployed robotics.
Deep packet analysis, network exploitation, and adversarial threat hunting. TCP/IP, DNS, TLS internals. APT behavioural analysis and vulnerability scanning across enterprise and industrial network stacks.
Application-layer vulnerability research, manual testing, and attack surface mapping. Bug bounty and coordinated disclosure.
Adversarial simulation, stealth and evasion, C2 frameworks, persistence mechanisms, lateral movement, and living-off-the-land techniques. The long game.
Black box, grey box, and white box engagements across network, web application, and OT/ICS environments. Structured methodology from recon through reporting and remediation.
Autonomous recon, LLM-assisted exploitation, AI-driven persistence and evasion. Adversarial attacks on ML systems embedded in cyber-physical infrastructure. How AI inference pipelines at the edge of autonomous and industrial platforms reshape the attack surface.