cybersecurity research / AI & ML research

VEXEL

we find the vulnerabilities others miss

We find the vulnerabilities others miss.

We are a decentralised collective of researchers, engineers, and exploit developers operating at the edges of what's considered secure infrastructure.

Our work lives in the negative space of systems: parser drift, trust boundaries, stale credentials, and assumptions quietly left exposed.

We publish the field notes here. CTF writeups, vulnerability research, tool breakdowns, and the trail of evidence behind the find.

Edge Recon

Mapping exposed surfaces, protocol drift, and forgotten ingress. Latency anomalies. Phantom routes. The perimeter always leaves residue.

Shard Recovery

Excavating buried datasets, orphaned backups, and stale secrets. What was deleted usually still has a shadow.

Noise Parsing

Decoding weak assumptions outside the happy path. Error states, side channels, and logs confess under pressure.

Ghost Logic

Finding hidden state machines in normal-looking flows. The exploit chain is usually hiding where everyone stopped looking.

Ready to find the vulnerability?

Send the brief. We'll read the trace.