I help Fortune 500 companies build Autonomous Security Programs and AI Red Teams. 20+ years in offensive and defensive security β from hands-on red team ops to vCISO engagements across regulated industries.
My GitHub is where I document the work: AI attack tooling, red team playbooks, cloud pentest methodology, and bug bounty systems. If it's offensive, automated, or AI-native, it's probably here.
π Currently working on AI-native security orchestration β building autonomous red team workflows using Claude Code, MCP servers (Shodan, Metasploit, Nuclei), and agentic pipelines that find and validate vulnerabilities at scale
π― Looking to collaborate with AI security researchers, bug bounty hunters, red teamers, and anyone building on top of agentic AI for offensive security
π€ Looking for help with Go tooling for recon automation, my first zero day, CVE and custom nuclei template development
π± Currently learning agentic AI attack surfaces, LLM jailbreak chains, and adversarial ML β alongside AI/ML coursework at MIT Sloan
π¬ Ask me about AI red teaming, bug bounty methodology, AWS privilege escalation, vCISO program builds, or how to run a white-box pentest at scale for under $2k
π« Reach me at sentinelsec.ai or @aladdinelston on Twitter
β‘ Fun fact: I recently ran 100 AI-powered white-box pentests across repos and found 4000 Critical/High vulnerabilities β including RCE, cross-tenant IDOR exposing bank PII, and committed AWS keys in production. A traditional firm would have billed $2M for the same scope.