πΎ Red Team Operator | Creator of Hydrapulse | Breaking Web2, Web3, and AI/ML with code
Multi-headed beast engineered for autonomous red teaming across three verticals.
Hydrapulse isnβt just a toolkit β itβs a war engine. Under active development.
Domain | Hydra Head Name | Role Description | Directory Path |
---|---|---|---|
Web2 | VENIN |
Web attack automation, recon, injection | modules/venin/ |
Web3 | OBLIV |
Smart contract abuse, DeFi exploit | modules/obliv/ |
AI / ML | PSYKHE |
LLM fuzzing, prompt injections, logic break | modules/psykhe/ |
- π΄ββ οΈ SAP - ATO β Deep session chain led to full takeover
- π‘οΈ University of Texas - Critical Info Disclosure β Leaked sensitive data via auth misconfig
- π¬ Substack - ATO β Account takeover through chained payload injection
- π€ ACE in ML Model (Private) β AI model pwned via deserialization + custom bypass chain
Dozens of hits went untracked on Bugcrowd/H1 and some from private org. From now on, everything gets logged.
- π§ Exploiting LLMs and model APIs at scale
- πΈοΈ Expanding Web2 automation chains (Hydrapulse)
- βοΈ Modularizing my fuzzing infrastructure
- π¦ Twitter/X: @noob6t5
- π¬ Always open to war-game ideas, collabs, and chaos