👾 Red Team Operator | Creator of Hydrapulse | Breaking Web2, Web3, and AI/ML with code
Multi-headed beast engineered for autonomous red teaming across three verticals.
Hydrapulse isn’t just a toolkit — it’s a war engine. Under active development.
| Domain | Hydra Head Name | Role Description | Directory Path |
|---|---|---|---|
| Web2 | VENIN |
Web attack automation, recon, injection | modules/venin/ |
| Web3 | OBLIV |
Smart contract abuse, DeFi exploit | modules/obliv/ |
| AI / ML | PSYKHE |
LLM fuzzing, prompt injections, logic break | modules/psykhe/ |
- 🏴☠️ SAP - ATO — Deep session chain led to full takeover
- 🛡️ University of Texas - Critical Info Disclosure — Leaked sensitive data via auth misconfig
- 📬 Substack - ATO — Account takeover through chained payload injection
- 🤖 ACE in ML Model (Private) — AI model pwned via deserialization + custom bypass chain
Dozens of hits went untracked on Bugcrowd/H1 and some from private org. From now on, everything gets logged.
- 🧠 Exploiting LLMs and model APIs at scale
- 🕸️ Expanding Web2 automation chains (Hydrapulse)
- ⚙️ Modularizing my fuzzing infrastructure
- 🐦 Twitter/X: @noob6t5
- 💬 Always open to war-game ideas, collabs, and chaos

