██████╗ ██╗    ██╗███████╗ █████╗ ██████╗ ██╗   ██╗
██╔═══██╗██║    ██║██╔════╝██╔══██╗██╔══██╗╚██╗ ██╔╝
██║   ██║██║ █╗ ██║█████╗  ███████║██████╔╝ ╚████╔╝ 
██║▄▄ ██║██║███╗██║██╔══╝  ██╔══██║██╔══██╗  ╚██╔╝  
╚██████╔╝╚███╔███╔╝███████╗██║  ██║██║  ██║   ██║   
 ╚══▀▀═╝  ╚══╝╚══╝ ╚══════╝╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝   
        
█
Home | About | Current Focus | Blog | Upcoming Research | Backburner | Contact

🌌 Research with Purpose 🌌

Reverse engineering, security research, and transparency advocacy.

Welcome

Welcome to a space for breaking things — responsibly. This site documents independent research across physical and digital systems: lock mechanisms, embedded protocols, misbehaving firmware, and whatever else invites a closer look. All investigations here are guided by ethics, transparency, and the belief that curiosity, when paired with consent, can make systems safer for everyone.

Recent Blog Posts

  • 🐝🤖 Swarnam at WRCCDC Regionals — AI vs. AI in a First-of-Its-Kind Live Cyber Competition 🤖🐝 - March 31, 2026
  • 🍽️ weekly-feast: When Your Spouse Breaks Your Threat Model 🍽️ - March 10, 2026
  • 👻🎬 Apparition Delivery System --- WRCCDC Red Team Showcase Recap 🎬👻 - March 07, 2026

See all posts →

© 2025 Qweary — Security Research With Purpose

LinkedIn | Email Me