"My

My journey began in tech SEO, optimizing digital visibility for businesses. But as I witnessed the growing threats to intellectual property and digital assets, I realized something critical: the same analytical mindset that drives SEO success could revolutionize cybersecurity defense.

Today, I’ve evolved from protecting search rankings to protecting what matters most – your intellectual assets, your data, and your digital life. Through AIMF LLC, I build and freely distribute advanced cybersecurity tools because I believe everyone deserves enterprise-grade protection, regardless of budget. My mission is simple: democratize cybersecurity and help individuals and small businesses defend against the same threats that target Fortune 500 companies.

"What

"A

"Algorithmic

Most cybersecurity teams respond to signals; I model them. I apply search-engine–style analysis to network and human behavior—profiling patterns, drift, and anomalies the way an algorithm detects manipulation.

"A

"Multi-Device

99% of my defense work used multi-tier, multi-device tactics. I fought adversaries across IoT, phones, Pineapples, Stingrays, cars’ Bluetooth, cell towers, laptops, and even energy/side-channel systems used for air-gapped attacks. I combine telemetry and cross-device correlation to detect attacks that single-device tools miss.

"A

"Real-World

Under eleven months of continuous targeting by Russian actors and local harassment networks, I reverse-engineered attack flows and AI-driven tactics in real time—discovering signature behaviors of automated intrusion and deception systems and developing tailored countermeasures.

"A

"Built

Every tool and script I built was designed and hardened while actively under attack—live forensics, anomaly detectors, and containment tooling that worked in the field. These are survival-tested, not theoretical.

"Free

"OPEN

"Ambient

Experimental environment for monitoring and manipulating ambient EMF patterns

Overview:
• Research and tooling for EMF signal behavior
• Ambient interference capture experiments
• Statistical chaos analysis integrations

Features:
• Multi-sensor data ingestion
• Signal pattern logging
• Real-time anomaly detection

Tech Stack:
• Python / Arduino / SDR integrations
• Data visualization stack
• Modular plugin system

Status:
• Experimental / active development
• Open-source prototype
• Invites research collaboration

"Windsurf

One-click clearing of historical access and privacy residue

Overview:
• Automates clearing of historical access data
• Enforces privacy baselines across environments
• Repeatable, safe operations

Key Features:
• Scripted clean sequences
• Dry-run and confirmation options
• Integrates with existing workflows

Tech Stack:
• Node / Python scripts
• CLI interface
• Cross-platform focus

Status:
• Open-source
• Documentation in progress
• Great for privacy hygiene automation

"Stingray

"Pineapple

Tools & tactics for detecting rogue AP cloning and Wi-Fi hijacking

Overview:
• Detect SSID clone behavior & suspicious auto-connect events
• Daily SSID rotation workflows
• Field notes for investigation hygiene

Toolkit:
• AP scanning & signal heuristics
• Isolation & recon safety procedures
• Response checklists

Tech Stack:
• Shell / CLI utilities
• Linux & macOS compatible
• Documentation-driven

Status:
• Public repo
• Community-friendly
• Actively refined

"Persistent

Headless, scheduled packet captures with logs & activity dashboards

Overview:
• Start/stop monitor with configurable capture duration & interval
• Interface activity board with live status tracking
• Automatic rolling PCAP saves to chosen directory

Key Features:
• Multi-interface monitoring
• Activity / Logs / Files tabbed views
• Built for stealthy, persistent data collection

Tech Stack:
• Wireshark / tshark automation
• Electron or headless Node UI
• Tailwind-styled panels

Status:
• Actively evolving
• Open-source roadmap in progress
• Ideal for long-running investigations

"Clock

"PhoneRootBot"

Automation toolkit for mobile forensic baselines and device integrity checks

Overview:
• Establish baseline verification for mobile devices
• Perform repeatable checks & generate logs
• Assist in forensic triage workflows

Automations:
• Structured checklists
• Report generation
• Extensible hook system

Tech Stack:
• Python + ADB / CLI tools
• YAML-driven tasks
• Markdown report templates

Status:
• Open-source
• Actively evolving
• Community input welcome

Security Research Case Studies

Real-world threat analysis with PCAP forensics, MITRE ATT&CK mapping, and IOC-based reporting. See how these tools were built and tested under active attack conditions.

6.5M+ packets analyzed • 5 documented incidents • 15+ MITRE techniques mapped