██████╗ ██╗    ██╗███████╗ █████╗ ██████╗ ██╗   ██╗
██╔═══██╗██║    ██║██╔════╝██╔══██╗██╔══██╗╚██╗ ██╔╝
██║   ██║██║ █╗ ██║█████╗  ███████║██████╔╝ ╚████╔╝ 
██║▄▄ ██║██║███╗██║██╔══╝  ██╔══██║██╔══██╗  ╚██╔╝  
╚██████╔╝╚███╔███╔╝███████╗██║  ██║██║  ██║   ██║   
 ╚══▀▀═╝  ╚══╝╚══╝ ╚══════╝╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝   
        
█
Home | About | Current Focus | Blog | Upcoming Research | Backburner | Contact

🌌 Research with Purpose 🌌

Reverse engineering, security research, and transparency advocacy.

Welcome

Welcome to a space for breaking things — responsibly. This site documents independent research across physical and digital systems: lock mechanisms, embedded protocols, misbehaving firmware, and whatever else invites a closer look. All investigations here are guided by ethics, transparency, and the belief that curiosity, when paired with consent, can make systems safer for everyone.

Recent Blog Posts

  • 🐝🏆 Swarnam at NCCDC Nationals — Five Days' Notice, One SSH Tunnel, and a Blue Team That Fought Back 🏆🐝 - April 27, 2026
  • 🐝🔨 Building Swarnam — A Multi-Agent Red Team Swarm in Three Weeks 🔨🐝 - April 07, 2026
  • 🐝🤖 Swarnam at WRCCDC Regionals — AI vs. AI in a First-of-Its-Kind Live Cyber Competition 🤖🐝 - March 31, 2026

See all posts →

© 2025 Qweary — Security Research With Purpose

LinkedIn | Email Me