Sherlock Holmes with a laptop — I might take your case if it sparks my interest
I'm an ethical hacker with a background in offensive cyber operations, OSINT, and digital forensics. I've trained privately in military and physical security, giving me knowledge beyond the keyboard. I was born in a country plagued by real crime and corruption — I've seen how ugly the world can be, and I've adapted to it.
My work is deeply private, strategic, and puzzle-driven. I don't do this for money or reputation — I do it for the love of the challenge. Think of me like Sherlock Holmes with a laptop — I won't take every case, but I might take yours if it sparks my interest.
I also develop and use my own self-written, local AI tools to help with investigations:
And let's be honest: I've seen things. No matter how dark your situation is, I don't judge.
"Ist nicht mein Bier."
When I'm done, your data is deleted. Clean and simple.
I investigate using open-source intelligence: from social media, metadata, emails, usernames, forums, and document trails — to everything that can be found online legally.
I explore the dark web using controlled tools and methods — for intelligence, not interaction.
If I encounter illegal material, I halt the case and notify the client to go to the proper authorities.
I analyze phones, computers, logs, and behavioral data — legally and safely.
🔒 I require explicit consent from the legal owner or custodian before touching any device.
I act as a friendly, unofficial digital private investigator. I give second opinions, review claims, or help you verify digital truths.
I conduct real-world, physical investigations when it supports a case — and only within the law.
Occasionally, I may meet in person, depending on the case and location.
I only accept cases that are ethical, legal, and interesting. I may not respond to every request.