cybersecurity research / AI & ML research
VEXEL
we find the vulnerabilities others miss
// ABOUT
We find the vulnerabilities others miss.
We are a decentralised collective of researchers, engineers, and exploit developers operating at the edges of what's considered secure infrastructure.
Our work lives in the negative space of systems: parser drift, trust boundaries, stale credentials, and assumptions quietly left exposed.
We publish the field notes here. CTF writeups, vulnerability research, tool breakdowns, and the trail of evidence behind the find.
// OPERATIONS
Edge Recon
Mapping exposed surfaces, protocol drift, and forgotten ingress. Latency anomalies. Phantom routes. The perimeter always leaves residue.
Shard Recovery
Excavating buried datasets, orphaned backups, and stale secrets. What was deleted usually still has a shadow.
Noise Parsing
Decoding weak assumptions outside the happy path. Error states, side channels, and logs confess under pressure.
Ghost Logic
Finding hidden state machines in normal-looking flows. The exploit chain is usually hiding where everyone stopped looking.
// JOIN
Ready to find the vulnerability?
Send the brief. We'll read the trace.