Teaching Defensive AI to Think Like a Red Team
A walkthrough of how I architected multi-agent simulations that pit autonomous attackers against defensive RL policies to harden enterprise networks.
Autonomous security where reinforcement learning meets cyber warfare.
Intent-aware security cloud that predicts and neutralizes threats before breach.
Shortlisted finalist building adaptive AI for space infrastructure security.
Automated 100+ pentest tools into one framework; cut engagement time by 60%.
Autonomous MCP suite orchestrating reconnaissance, exploitation, and reporting from a single command surface.
Autonomous Playbooks
Configurable attack graphs that adapt based on live telemetry and surface new actions in real time.
Human-in-the-loop
Secure acknowledgement checkpoints ensure sensitive actions require explicit reviewer approval.
Deep reinforcement learning agents hardening networks by continuously sensing, simulating, and neutralising blended threats.
Adaptive Defenses
Policy updates streamed every 15 minutes based on live anomaly feedback and adversarial simulations.
Observability
Graph-based situational dashboards expose decision boundaries and confidence windows for every response action.
Full-stack ML platform triaging NASA Kepler signals into high-confidence exoplanet discoveries for Space Apps Challenge.
Explainability
Integrated SHAP overlays that justify every classification for mission review boards.
Collaborative
Realtime annotations let scientists interrogate light curves and leave decision trails.
Breaking down the architecture decisions that let pentestMCP compose reconnaissance, exploitation, and reporting without drowning operators in noise.
How graph neural networks can identify coordinated botnet behaviour across distributed IoT devices by modelling communication patterns as spatial-temporal graphs.
How we built North-Star, an interpretable ML pipeline that helps astronomers understand why a model flags a star system as hosting exoplanets.
A practical guide to implementing zero-trust principles in Kubernetes clusters, from network policies to runtime threat detection.
Exploring prompt injection, data poisoning, and model extraction attacks against LLMs—plus practical mitigations for production deployments.
Whether it's defensive AI systems, offensive security automation, or cutting-edge research collaboration — I'm always open to discussing ambitious projects that push boundaries.