bash — trashpanda@sec:~#

trashpanda@sec : ~ $ whoami

Karol Budzyn

trashpanda@sec : ~ $ cat /etc/roles

trashpanda@sec : ~ $ echo $MOTTO

Critical Infrastructure Protection · OT/ICS Security · Cryptographic Architecture

trashpanda@sec : ~ $

Available for engagements Warsaw, PL · UTC+2
2+ yrs OT field
4 certifications
3 industrial protocols
WUT Warsaw Tech student
AZ-500 Azure Security Engineer AZ-900 Azure Fundamentals CompTIA Security+ Niebezpiecznik CyberSec

Latest Posts

agentic-ai-llm-security.md 01
AI SecurityLLMAgentic AIPrompt InjectionRed TeamingSupply Chain

Agentic AI and LLM Security: What Changes When the Model Can Act

LLMs that browse the web, write code, and call APIs are a fundamentally different threat surface than chatbots. This post breaks down the attack classes unique to agentic systems and what defenders actually need to think about.

12 min read →
banking-cybersecurity-standards.md 02
Banking SecurityDORAFFIECSWIFTComplianceFinancial Services

Cyber Resilience in Banking: DORA, FFIEC, and SWIFT's Security Controls

A practitioner's guide to the major cybersecurity frameworks governing financial institutions - DORA in the EU, the FFIEC guidelines in the US, and the SWIFT Customer Security Programme worldwide.

9 min read →
pci-dss-deep-dive.md 03
PCI DSSCompliancePayment SecurityCryptographyPenetration Testing

PCI DSS 4.0: What the Standard Actually Demands

A practitioner's breakdown of PCI DSS v4.0 - its twelve requirements, the 2025 deadline for future-dated controls, and where organisations most commonly fall short.

7 min read →

Featured Projects

in dev

SentinelCPP

Lightweight EDR agent for Windows written in C++17. Performs real-time process monitoring via the Toolhelp32 API (500 ms snapshots), extracts executable paths and PPID metadata, and applies path-based heuristics to detect masqueraded system binaries - e.g. svchost.exe or lsass.exe spawned outside System32. Suspicious processes are automatically terminated and all security events are written to a structured incident log with INFO / WARN / CRITICAL severity levels.

C++WindowsEDRBlue TeamThreat DetectionWin32 API
View on GitHub →
active

TL-WR841N Hardware Exploitation

Full hardware security audit of the TP-Link TL-WR841N consumer router. Root shell obtained via UART (FT232 adapter, 115200 baud), WPA2 passphrases recovered from RAM-disk files, MTD flash partitions dumped via /dev/mtdblock, and active listeners decoded from /proc/net/tcp hex descriptors. Reference for embedded Linux attack surface analysis on MIPS/BusyBox IoT devices.

Hardware HackingIoTUARTEmbedded LinuxMIPSRed Team
View on GitHub →

# get in touch

Let's work together

Open to freelance engagements, penetration testing, infrastructure reviews, and consulting.

Available now · Responds within 24h · Warsaw, PL · Remote friendly
Send a message