About Me
Security researcher, developer, and builder of things that break other things.
whoami
srdusr
(noun/alias) • /ˈsərdəzər/
• A combination of the words "sword" and "user", shortened for convenience and styled in the fashion of unix commands.
• Example: srdusr, akin to a command-line ninja, slashes through technical challenges with the agility and precision of a well-honed blade...
I'm a security researcher and software developer based somewhere on the internet. I spend my free time refining my skills, exploring new technologies and always breaking things! When not coding/researching, you can find me optimizing my workflow or practicing modern-day fencing (the one with swords in it).
What I Do
I specialize in offensive security, penetration testing, and vulnerability research. My work involves finding and exploiting weaknesses in systems before the bad guys do, then helping organizations fix them. I build custom tools, automate security workflows, and contribute to open-source security projects.
When I'm not breaking things, I'm building them — from software to infrastructure automation. I believe the best security professionals understand both sides: how to build secure systems and how to break them.
Skills & Expertise
Security
- Penetration Testing
- Web Application Security
- Network Security
- Reverse Engineering
- Exploit Development
- Malware Analysis
Development
- Python, C, C++, Rust
- JavaScript/TypeScript
- React & Next.js
- Backend APIs
- Systems Programming
- Tool Development
Infrastructure
- Linux/Unix Systems
- Docker & Kubernetes
- Cloud Platforms (AWS, GCP)
- CI/CD Pipelines
- Infrastructure as Code
- Network Architecture
Tools
- Burp Suite
- Metasploit
- Wireshark
- Nmap
- IDA Pro / Ghidra
- Custom Scripts & Tools
Current Focus
Currently exploring advanced persistent threat (APT) techniques and researching novel attack vectors in the kernel/OS level. I'm particularly interested in the intersection of AI/ML and cybersecurity, both as attack vectors and defensive mechanisms.
I also have been spending a lot of time building custom security tools. The commercial tools are great, but sometimes you need something tailored to your specific workflow. I've been developing automated reconnaissance frameworks, custom fuzzing tools, and scripts that help identify patterns across large codebases. Most of these end up on my GitHub once they're polished enough...
Get in Touch
Interested in collaborating on security research, cool ideas or just want to chat about the art of dueling and the renaissance era? Feel free to reach out.