mr.rabbit@01rabbit:~$ whoami
Independent Security Researcher & Open-Source Security Tool Developer
"Delay to win" — deceive, contain, and buy time. Gateway that absorbs attacks and orchestrates tactical delaying actions.
Azazel System core gateway doctrine and tool family for delaying action, deception, and edge defense.
Successor to Azazel-Pi — deterministic edge SOC/NOC gateway with explainable decision-making and optional local AI assist.
Archived prototype and predecessor of Azazel-Edge. Presented as an offline edge AI SOC/NOC gateway for constrained and emergency environments.
Portable tactical defense gateway for untrusted Wi-Fi — modes: Portal / Shield / Scapegoat.
Archived predecessor of Azazel-Gadget — compact USB-OTG Pi Zero gadget for portable deception and local network response.
Penetration testing automation frameworks — from keypad-driven TUIs to voice and chat-guided operations.
Numeric Keypad Navigation System for Kali-based tools. Black Hat Asia Arsenal 2020.
Training-focused launcher with 3–5 digit codes. Conforms to NIST SP 800-115.
Mattermost chatbot: natural language → operational pentest commands.
Voice-guided pentest assistant with Artificial Incompetence — fully offline, air-gap friendly.
Janus Eidolon System — local-only coercion-aware storage for controlled disclosure under compelled access and device seizure scenarios.
Coercion-aware local storage system that separates visible disclosure from protected local state. Designed for field-risk evaluators and security researchers facing compelled access or seizure scenarios.
I am an independent security researcher and open-source security tool developer focused on defensive security, deception, constrained SOC/NOC operations, and coercion-aware security design. My work turns offensive experience into defensive tools that buy time, preserve visibility, and make attackers waste effort in carefully controlled places.
I build systems such as Azazel System, a cyber scapegoat gateway for delaying action and deception-aware edge defense; Phasmid, a coercion-aware local storage project; and earlier pentesting support tools including PAKURI, KaliPAKU, BOCCHI, and Babbly.
These projects have appeared at conferences including Black Hat Arsenal, BSides Las Vegas, BSides Tokyo, SECCON, AVTOKYO, CODE BLUE, and SecTor. The research is mostly self-funded, which proves two things: the tools are portable, and so are the bills.