πArkhAngelLifeJiggy:~#
Pray. Smoke. Code. Hack. Eat. Smoke. Pray. Sleep. Repeat!!!
I'm a multidisciplinary security researcher and offensive developer with a mission: to uncover hidden flaws before they become breaches.
From code to binaries, AI prompts to zero-days β I hunt vulnerabilities across the stack to make systems safer, smarter, and more resilient.
π "Many roles, one goal":
Bug Bounty Hunter β’ Software Developer β’ AI Integrator β’ Reverse Engineer β’ Chess Player
Frameworks: Aiohttp, Scapy, pwntools, Flask/FastAPI, Requests, Tinker, PyQT5.
Security Modules: Impacket, Cryptography, PyJWT, SQLMap API, Mitmproxy.
AI/ML Modules: PyTorch, NLTK, Scikit-learn, Transformers (HuggingFace), LangChain, sentence-transformers.
Frameworks: Node.js, React, Express, Next.js.
Security Tools: DOMPurify, JSDetox.
AI Modules: TensorFlow.js, Brain.js.
Frameworks: NestJS, Angular, Deno
Security Tools: tsyringe (DI for secure arch), ESLint security plugins
AI Modules: ONNX Runtime, tfjs-ts
Frameworks: Gin, Cobra, gRPC
Security Modules: go-net/http2, Zap (logging), go-impacket, nmap bindings
AI Modules: Gorgonia, GoLearn
Frameworks/Libs: LLVM, Boost, Qt
Security Tools: Capstone, Unicorn Engine, Radare2 APIs
AI Modules: mlpack, Dlib
Tools: Metasploit integration, Empire, PowerSploit, Nmap
AI Modules: API hooks into Python-based ML models (PyTorch/TensorFlow serving)
- β Bug Bounty Hunting β Hunting critical flaws in real-world apps
- β Reverse Engineering β Analyzing binaries, firmware, and malware
- β Web App Security β XSS, SQLI, SSRF, IDOR, PATH, LFI, RCE, Auth bypass
- β AI Security β Prompt injection, model leakage, LLM red teaming
- β Exploit Development β From PoC to working shell
- β Secure Development β Building apps that resist attacks
VS-Code β’ Pycharm β’ Burp Suite β’ Browser DevTools β’ Zap Proxy β’ SQLmap β’ Git β’ Docker β’ AWS β’ GitHub Actions
I donβt just find bugs β I reverse-engineer systems, build offensive tools, and engineer exploits that expose deep architectural flaws.
- Hunting 0-day, Critical, High, Meduim Vulnerabilities in web, network and mobile apps
- Developing Web Crawler, Mapper, AI-powered chatbot, real-live project and security tools and smart fuzzers
- Reverse engineering closed-source software and protocols
- Writing exploits for memory corruption, logic flaws, and race conditions
- Engineering obscure prompt injections to test AI system integrity
- Advanced binary exploitation and kernel-level vulnerabilities
- Bug bounty hunting
- AI/ML security: Adversarial attacks, data poisoning, model theft
- Automated vulnerability discovery using code analysis + AI
- Firmware hacking and embedded device security (IoT/OT)
- Building open-source tools for the security community
I'm always open to working with:
- Security researchers on bug bounty teams or private programs
- Developers building secure-by-design applications
- Open-source projects focused on security tooling or vulnerability research
- AI engineers pushing the edge of LLM security & red teaming
Whether it's a joint write-up, tool development, or just geeking out over a cool exploit β letβs connect.
- π (Twitter): https://www.x.com/@Arkhlifejiggy
- Email: [[email protected]] | [[email protected]]
- Portfolio: https://arkhangel-lifejiggy.vercel.app
- X: @ArkhLifeJiggy
- Reddit: u/ArkhAngelLifeJiggy -βDiscord: @arkhangelnirchnllifejiggy
- Bugcrowd: https://www.bugcrowd.com/ArkhAngelLifeJiggy
- Hackerone: https://hackerone.com/arkhangellifejiggy
- Pypi: https://pypi.org/user/Arkhangellifejiggy
- Npm: https://www.npmjs.com/~arkhangellifejiggy
- Medium: https://medium.com/@ArkhAngelLifeJiggy
- CTF/Writeups: [Coming soon]
He/Him