About this site
This site is a place to share the real-world side of security testing and exploit development within Industrial Control Systems (ICS). Expect Adversarial Machine Learning experiments and technical walkthroughs.
I started it to document some of the tools, techniques and thinking that goes into environments that aren’t easy to replicate, like critical infrastructure or air-gapped networks.
You’ll find posts on:
- Offensive security labs and attack chains
- Industrial / SCADA test environments (e.g., GRFICS, OpenPLC, Factory I/O)
- Adversarial ML experiments in ICS
- Pen test tools, scripts, and custom exploits
- Operational red teaming techniques
- Training material and field notes
Everything here is developed and tested in offline, controlled environments and shared with responsible security in mind. Any vulnerabilities discussed are either known or responsibly disclosed prior.
If you're into the same space or building your own offensive capability, feel free to reach out or dig into the posts.