bash — trashpanda@sec:~#

trashpanda@sec : ~ $ whoami

Karol Budzyn

trashpanda@sec : ~ $ cat /etc/roles

trashpanda@sec : ~ $ echo $MOTTO

Critical Infrastructure Protection · OT/ICS Security · Cryptographic Architecture

trashpanda@sec : ~ $

Available for engagements Warsaw, PL · UTC+2
2+ yrs OT field
4 certifications
3 industrial protocols
WUT Warsaw Tech student
AZ-500 Azure Security Engineer AZ-900 Azure Fundamentals CompTIA Security+ Niebezpiecznik CyberSec

Latest Posts

banking-cybersecurity-standards.md 01
Banking SecurityDORAFFIECSWIFTComplianceFinancial Services

Cyber Resilience in Banking: DORA, FFIEC, and SWIFT's Security Controls

A practitioner's guide to the major cybersecurity frameworks governing financial institutions - DORA in the EU, the FFIEC guidelines in the US, and the SWIFT Customer Security Programme worldwide.

9 min read →
pci-dss-deep-dive.md 02
PCI DSSCompliancePayment SecurityCryptographyPenetration Testing

PCI DSS 4.0: What the Standard Actually Demands

A practitioner's breakdown of PCI DSS v4.0 - its twelve requirements, the 2025 deadline for future-dated controls, and where organisations most commonly fall short.

7 min read →
ot-integration-security-reality.md 03
OT SecurityICSCommissioningIEC 62443PLCProfinetField Notes

OT Integration in the Field: What the Standards Don't Tell You

After commissioning industrial systems across multiple sites, I've seen firsthand how far the real world sits from IEC 62443. This is what poor OT security looks like when nobody's watching.

9 min read →

Featured Projects

in dev

SentinelCPP

Lightweight EDR agent for Windows written in C++17. Performs real-time process monitoring via the Toolhelp32 API (500 ms snapshots), extracts executable paths and PPID metadata, and applies path-based heuristics to detect masqueraded system binaries - e.g. svchost.exe or lsass.exe spawned outside System32. Suspicious processes are automatically terminated and all security events are written to a structured incident log with INFO / WARN / CRITICAL severity levels.

C++WindowsEDRBlue TeamThreat DetectionWin32 API
View on GitHub →
active

TL-WR841N Hardware Exploitation

Full hardware security audit of the TP-Link TL-WR841N consumer router. Root shell obtained via UART (FT232 adapter, 115200 baud), WPA2 passphrases recovered from RAM-disk files, MTD flash partitions dumped via /dev/mtdblock, and active listeners decoded from /proc/net/tcp hex descriptors. Reference for embedded Linux attack surface analysis on MIPS/BusyBox IoT devices.

Hardware HackingIoTUARTEmbedded LinuxMIPSRed Team
View on GitHub →

# get in touch

Let's work together

Open to freelance engagements, penetration testing, infrastructure reviews, and consulting.

Available now · Responds within 24h · Warsaw, PL · Remote friendly
Send a message