Independent security researcher building open-source tools, a programming language, and a Linux distribution. Contributing to the security community across 17 major projects.
// Data flows left-to-right
let report = transactions
|> filter(|t| t.amount > 20.0)
|> group_by(|t| t.category)
|> map_entries(|cat, txns| {
let total = txns |> sum()
(cat, total)
})
|> sort_by(|e| e.1, descending)
// Pattern matching with guards
match shape {
Circle(r) if r > 100 => "Large",
Circle(r) => "Circle",
Rect(w, h) => "Rect",
}
A compiled language where data flows left-to-right. Pipeline operators, pattern matching, async/await, and zero dependencies.
|> — first-class data flowspawn concurrencytry/recover/ensure error handlingFrom a programming language to a Linux distribution to mobile security frameworks.
Pipeline-driven programming language with pattern matching, async/await, and a full OS written in it. Compiler, VM, web framework, 25 tutorials.
Explore Lateralus →Security-focused Linux distribution with 140+ pre-installed tools, AI assistant, and 5 specialized editions.
View Repository →Privacy-focused security browser with Dr. Marshall AI assistant and built-in exploit tools.
View Repository →Mobile security framework supporting 18 manufacturers with baseband and 5G/LTE testing.
View Repository →High-speed log analysis & forensics engine with blazing fast pattern matching and timeline reconstruction.
View Repository →Automotive & ECU security — CAN bus, OBD-II, UDS protocols, key fob analysis, ECU fuzzing & tuning.
View Repository →96+ WiFi Pineapple Pager payloads across 13 categories with auto-installer.
View Repository →430+ Flipper Zero files — 80 BadUSB payloads, 40 SubGHz signals, 16 IR remotes, NFC, RFID, animations.
View Repository →RCE hardening for gamers — game launcher scanning, anti-cheat auditing, mod & overlay vulnerability checks.
View Repository →Open-source contributions and project metrics.
80 merged PRs across 51 repos — 1M+ combined stars.
Specialized tools organized by domain.
Technical deep-dives, project announcements, and security research.
We built a programming language where data flows left-to-right. Here's why, and how you can try it right now.
Why |> changes how you think about data processing — from nested calls to linear flows.
What it takes to write an operating system kernel in Lateralus — from bootloader to memory management.
How pipeline operators and pattern matching make security tool development cleaner and more composable.
22 repos, 2,400+ .ltl files, a compiler, VS Code extension, and more — the full ecosystem guide.
What defenders miss — attack chains, response sizes, process masquerading, and how LogReaper catches them.