PLAY DANGEROUS
Bones. Blood. WADD.
Nonna's kitchen, bone dice, your father's debt at the door. A crime-family saga built from story rooms, arcade jobs, HEAT, RESPECT, relics, bad luck, and the ugly little objects people carry when America starts calling.
Vaporwave Social Engineering Puzzle
Fast sixty-second boards in a poisoned city where manipulation has three verbs: hack for speed, love for access, betray for power. Every victory teaches the system something about your appetite.
MDRN develops core systems, deployment stacks, and research workbenches that power our strange worlds.
macOS trading desk for SPY and VXX options trading with multi-factor validation.
Mobile app offering breathing techniques for physiological regulation without tracking.
Private signing and deployment server for rapid iOS app installation and Apple validation blocking.
macOS writing tool using color psychology and professional layout to enhance focus.
Security monitor for iOS, macOS, and Linux that detects IMSI catchers and signal downgrades.
macOS utility that identifies and removes gigabytes of invisible junk files and build artifacts.
Automation engine for visual regression testing and generating framed App Store screenshots.
Host Intrusion Prevention System (HIPS) prototype for macOS demonstrating security internals.
Professional-grade audio levels monitor and direct-to-disk recording application for macOS.
Performance-grade 8-voice polyphonic synthesis engine and VST3/AU plugin built with JUCE 8.
Network filter for packet manipulation, MAC spoofing, and IDS evasion for security research.
Terminal-native financial tool that evaluates if market information remains tradable or is obsolete.
Workbench for evaluating Claude's safeguards, model behavior, and attack vectors.
Security tool for testing metadata injection, steganography, and parser exploits in image formats.
Penetration testing framework designed to audit and secure newsroom infrastructure.
APT-inspired C2 suite for managing distributed trading nodes and liquidity coordination.
Precision wireless intelligence suite for airspace enumeration, behavioral profiling, and anomaly detection.
Tactical drone security platform for protocol interception, RF analysis, and MAVLink override simulation.
Technical control interface for independent media labs with system telemetry and app injection.
Privacy-first local perimeter monitoring station for secure, cloud-free surveillance management.
Specialized framework for verifying the integrity and security of wireless network adapters.
Visual privacy remediation suite for identifying and scrubbing regional identifiers, landmarks, and boutique signatures from digital assets.
Specialized media player designed to protect desktop activity from screen-scraping and automated monitoring through screenshot hardening and panic-key obfuscation.
A high-deterrence security layer that protects digital domains from unauthorized scrapers by imposing resource-draining retaliation protocols.
Cynthia handles the frequencies while you pour a double. Discreet, sophisticated, and strictly professional. Mostly.
Trust nothing, verify everything. A multi-agent security auditor that hunts for hallucinations, ghost methods, and sanitization theater in AI-generated code.
AI-integrated workshop for developing stealthy UserScripts and offensive site augmentations.
Educational security demo showcasing how malicious extensions can silently drain crypto wallets.
YouTube ad silencer serving as a research case study for hardened extension architectures.
Browser extension designed to resist emotional capture by blocking attention-hijacking content.