👾 Red Team Operator | Creator of Hydrapulse | Breaking Web2, Web3, and AI/ML with code
I build offensive tooling that automates chaos across Web2, Web3, and AI/ML attack surfaces.
I chased all three like a rabid dog, got lost in the noise. Now I’m laser-focused on Web2 and AI — crafting precise, modular tooling that punches through real systems. No filler. No theory. Just red team code that bleeds.
Everything I build feeds into Hydrapulse — my personal automation system engineered to hunt, exploit, and exfiltrate.
Multi-headed beast engineered for autonomous red teaming across three verticals.
Hydrapulse isn’t just a toolkit — it’s a war engine. Under active development.
Domain | Hydra Head Name | Role Description | Directory Path |
---|---|---|---|
Web2 | VENIN |
Web attack automation, recon, injection | modules/venin/ |
Web3 | OBLIV |
Smart contract abuse, DeFi exploit | modules/obliv/ |
AI / ML | PSYKHE |
LLM fuzzing, prompt injections, logic break | modules/psykhe/ |
- 🏴☠️ SAP - ATO — Deep session chain led to full takeover
- 🛡️ University of Texas - Critical Info Disclosure — Leaked sensitive data via auth misconfig
- 📬 Substack - ATO — Account takeover through chained payload injection
- 🤖 ACE in ML Model (Private) — AI model pwned via deserialization + custom bypass chain
Dozens of hits went untracked on Bugcrowd/H1 and some from private org. From now on, everything gets logged.
- 🧠 Exploiting LLMs and model APIs at scale
- 🕸️ Expanding Web2 automation chains (Hydrapulse)
- ⚙️ Modularizing my fuzzing infrastructure
- 🐦 Twitter/X: @noob6t5
- 💬 Always open to war-game ideas, collabs, and chaos
This profile is under active evolution. It’s not a portfolio — it’s a battlefield.