WHO AM I.

I'm someone who builds and breaks — just to understand how things truly work. A curious mind shaped by code, networks, and the invisible layers of technology that most people never see.

I live at the intersection of cybersecurity and creativity. By day, I explore systems, vulnerabilities, and digital defenses. By night, I tell stories — through visuals, words, and frames that speak what silence cannot.

I don't just follow paths; I create my own. From building real-time cyber defense systems to experimenting with embedded devices and ethical hacking labs, I turn ideas into something tangible — something real.

But beyond the technical side, I'm deeply driven by emotion and storytelling. I see meaning in moments, beauty in details, and stories in everything around me.

I believe growth comes from curiosity, discipline, and the courage to step into the unknown. And no matter what I build — whether it's a system, a story, or a vision — it always reflects one thing:

// MANIFESTO I'm not here to just exist.
I'm here to understand, to create, and to leave behind something that matters.
SJT CYBERSEC.OPERATOR UID://0xSUJIT.10
● ONLINESYS_OK
// LONDON · UK · GMT+0

THE PATH

NOW

MSc Cybersecurity · London

Studying offensive security, secure systems design, and applied ML for cyber-defense. Capstone in progress.

2025

PatchPilot v2 · Production AI Sec Platform

Six-stage agent pipeline running on a Raspberry Pi. FastAPI/SSE backend, local LLM, RAG over CWE/OWASP knowledge base.

2025

Hacker's Backpack Kit · Field Operator Build

Pi 4 (Kali) + Pi Zero 2 W + ESP32 Marauder + NRF + PN532 + AC600. Portable, battery-powered, fully self-contained.

2024

Project AirGuard · Drone Pollution AI

Vehicle classification model (fuel vs EV) running on edge. Real-time CO/AQI telemetry over MQTT. Pi-based payload.

2023

First Pi · First Lab

Started with AdGuard, PiVPN, then a Wi-Fi pen-test lab against my own gear. Everything since has been on this foundation.

THREE RULES

How I decide what to build and how to spend my time.

01

BUILD TO LEARN

Theory is bait. The only way I retain a concept is to build it end-to-end — write the parser, solder the board, deploy the service, watch it fail.

02

SHOW PROOF

Talk is cheap. Repos, build logs, screenshots, network traces, container manifests — that's the receipt. If it isn't shippable, it isn't real.

03

TECHNICAL × CREATIVE

Cybersec is half craft, half storytelling. The same instinct that drives a screenplay drives a good detection rule — find the pattern, frame the truth.