I'm a multidisciplinary security researcher and offensive developer with a mission: to uncover hidden flaws before they become breaches.
From code to binaries, AI prompts to zero-days β I hunt vulnerabilities across the stack to make systems safer, smarter, and more resilient.
π "Many roles, one goal":
Bug Bounty Hunter β’ Software Developer β’ AI Engineer β’ Reverse Engineer β’ Prompt Alchemist
Frameworks: Aiohttp, Scapy, pwntools, Flask/FastAPI, Requests, Tinker, PyQT5.
Security Modules: Impacket, Cryptography, PyJWT, SQLMap API, Mitmproxy.
AI/ML Modules: PyTorch, NLTK, Scikit-learn, Transformers (HuggingFace), LangChain, sentence-transformers.
Frameworks: Node.js, React, Express, Next.js.
Security Tools: DOMPurify, JSDetox.
AI Modules: TensorFlow.js, Brain.js.
Frameworks: NestJS, Angular, Deno
Security Tools: tsyringe (DI for secure arch), ESLint security plugins
AI Modules: ONNX Runtime, tfjs-ts
Frameworks: Gin, Cobra, gRPC
Security Modules: go-net/http2, Zap (logging), go-impacket, nmap bindings
AI Modules: Gorgonia, GoLearn
Frameworks/Libs: LLVM, Boost, Qt
Security Tools: Capstone, Unicorn Engine, Radare2 APIs
AI Modules: mlpack, Dlib
Tools: Metasploit integration, Empire, PowerSploit, Nmap
AI Modules: API hooks into Python-based ML models (PyTorch/TensorFlow serving)
- β Bug Bounty Hunting β Hunting critical flaws in real-world apps
- β Reverse Engineering β Analyzing binaries, firmware, and malware
- β Web App Security β XSS, SQLI, SSRF, IDOR, PATH, LFI, RCE, Auth bypass
- β AI Security β Prompt injection, model leakage, LLM red teaming
- β Exploit Development β From PoC to working shell
- β Secure Development β Building apps that resist attacks
VS-Code β’ Pycharm β’ Burp Suite β’ Browser DevTools β’ Zap Proxy β’ SQLmap β’ Git β’ Docker β’ AWS β’ GitHub Actions
Windows β’ Kali Linux β’ Parrot Os β’ Arch Linux
I donβt just find bugs β I reverse-engineer systems, build offensive tools, and engineer exploits that expose deep architectural flaws.
- Hunting 0-day, Critical, High, Meduim Vulnerabilities in web, network and mobile apps
- Developing Web Crawler, Mapper, AI-powered chatbot, real-live project and security tools and smart fuzzers
- Reverse engineering closed-source software and protocols
- Writing exploits for memory corruption, logic flaws, and race conditions
- Engineering obscure prompt injections to test AI system integrity
π― My goal? Protect by exposing.
Every flaw I uncover is a breach prevented, a system hardened, a lesson learned.
- Advanced binary exploitation and kernel-level vulnerabilities
- Bug bounty hunting
- AI/ML security: Adversarial attacks, data poisoning, model theft
- Automated vulnerability discovery using code analysis + AI
- Firmware hacking and embedded device security (IoT/OT)
- Building open-source tools for the security community
I'm always open to working with:
- Security researchers on bug bounty teams or private programs
- Developers building secure-by-design applications
- Open-source projects focused on security tooling or vulnerability research
- AI engineers pushing the edge of LLM security & red teaming
Whether it's a joint write-up, tool development, or just geeking out over a cool exploit β letβs connect.
- π (Twitter): https://www.x.com/@Arkhlifejiggy
- Email: [Bloomtonjovish@gmail.com] | [emperorstephenpee001@gmail.com]
- GitHub: github.com/LifeJiggy
- CTF/Writeups: [Coming soon]
π¬ DM me on X for collabs, tips, or just to talk security, AI, or the next 0-day.
He/Him
βοΈ If you're building something secure, breaking something insecure, or pushing the edge of AI safety β letβs team up.
The future of security isnβt just defense. Itβs deep understanding, creativity, and relentless curiosity.
And Iβm all in.