red teamer focusing on мobile-first σffensive Security. honestly, forget the heavy rigs.. i'm just deploying full attack vectors straight from my phone. by leveraging Termux & some custom chroot environments, i basically flip standard mobile hardware into a weaponized C2 node.
- running on AArch64 via proot-distro/nethunter.
- mostly focused on Cellular egress & gray-man tactics to stay under the radar.
- plus, i use Python for all my air-gapped extraction automation.
>_ ιиfяα:
basically running a headless kali setup inside android user-space. no cloud, no bs—everything is 100% Local execution.
>_ тαℓк:
honestly, the most dangerous computer is the one you’ve got in your pocket right now.
!! нєα∂ѕ υρ: authorized access only. i’m watching the logs, so stay out.
doing some vulnerability research and exploit dev on the side. basically scanning targets, sniffing packets, and just automating payloads for fun. this profile is where i track my tools and activity while building stuff for the offensive security community.




