Let’s be real for a second. The project market for freelance developers in Germany right now? It’s basically dead. The economy is weird, budgets are frozen, and everyone is sitting on their hands.
But i’m not the type to sit around.
For those who don’t know my history, i was deep in the blackhat community back in the early 2000s (until about 2005). I’m not talking about running scripts i found on a forum; i’m talking about deep research. My most notable pwns from that era have never been discovered to this day, and i intend to keep it that way.
Fast forward to 2025. I’ve spent the last few years building high-end AI products and consulting. I realized i had two things: a deep understanding of offensive security from my youth, and a mastery of the modern AI stack.
So, i pivoted. I built a war machine.
Meet the Rig
I didn’t just write a python script that wraps Nmap. I built a fully distributed, AI-orchestrated bug bounty automation platform running on NixOS.
It’s a beast that runs while i sleep.
The Architecture
At its core, it is a distributed system managed by a central orchestrator (kistel) and a fleet of execution nodes (pwn1 through pwn4).
- Infrastructure: Everything is defined in NixOS flakes and deployed via
deploy-rs. If a node gets tainted or i need more compute, i just spin it up, and the state configuration handles the rest. - The Brain: A custom Go 1.25 backend backed by PostgreSQL 17 (sharding across 32 distinct table structures).
- The Muscle: A fleet of VMs loaded with 40+ standard security tools (Nuclei, Ffuf, SQLMap, etc.), but—and this is the key—driven by AI agents.
The AI Advantage: Multi-Model Orchestration
Most people trying to use AI for hacking just paste code into ChatGPT and ask “is this vulnerable?”. That’s amateur hour.
My system uses a Multi-LLM Orchestration layer. I use CLIProxyAPI to bundle all my various subscriptions behind a single Claude Code compatible API. This allows the orchestrator to dynamically route tasks to the model best suited for the job:
- Claude (Opus/Sonnet 4.5): Handles the high-level logic, exploit chaining, and “creative” thinking.
- MiniMax M2 & Kimi K2: My daily workhorses for context-heavy tasks (like dumping entire repo structures or massive JS files).
- GPT-5.2 Codex: Used strictly for generating exploit payloads and proof-of-concept scripts.
It’s Not a Script, It’s an Organization
I designed the system to function like a cyber-crime syndicate, but automated.
1. The Agent System (42+ Agents)
I have specialized agents for different domains. I don’t just have a “hacker bot.” I have:
- Recon Agents: Web discovery, deep GitHub dorking, subdomain enumeration.
- Exploit Agents: Specialized in XSS, SSRF, SQLi, GraphQL, and even CI/CD supply chain attacks.
- Blockchain Agents: Deep analysis of Move language contracts (Sui/Aptos), detecting specific vulnerabilities like Hot Potato pattern violations, Shared Object DoS, Flash Loan logic errors, and simulating MEV sandwich attacks.
- Apple Silicon Agents: Specialized in XNU kernel exploitation, PAC/Canary intersection analysis, and BlastDoor sandbox escapes.
- Platform Agents: Specialized agents for Android, iOS, Chrome V8 engine analysis.
2. The Skills System (100+ Skills)
The agents are equipped with “skills”—modular capabilities that they can activate on demand. Need to bypass a specific JWT implementation? There is a skill for that. Need to race a database transaction? The agent activates the RaceCondition skill and executes.
3. Automated Workflow
The system automatically syncs programs from HackerOne, Bugcrowd, Intigriti, YesWeHack, and Hackenproof. I’ve also manually imported targets from Google VRP and Apple Security Bounty, since they don’t operate as traditional bounty platforms.
- Ingest: It pulls the scope.
- Plan: LLMs analyze the scope and group targets based on technology stacks.
- Execute:
bounty-clitriggers the campaign. - Chain: If an agent finds a low-severity bug, it pings the Orchestrator, which might spin up a different agent to try and chain it into a critical.
- Submit: The system auto-formats the report, writes the reproduction steps, and even handles the initial triage Q&A via an auto-answer service.
Successes (and Failures) so far
During the first week of operating the v1 prototype of this rig, i managed to report valid duplicates. While “duplicate” might sound bad to some, to me, it was pure gold. It validated my entire idea. It proved that my AI agents were finding the same bugs as human hunters, just faster and while i was asleep.
Currently, 2 of my issues are in active triage and looking good.
Of course, it wasn’t all smooth sailing. Early on, i had a couple of “Invalid” reports—classic AI hallucinations where the model thought it saw a vulnerability that wasn’t there. That failure was actually the catalyst for refining my approach into the multi-stage, phase-based workflow (Recon -> Exploit -> Verify) i use now.
I also still have a bunch of reports on HackerOne that are sitting in “Unread” or “No-Reply” limbo. In two specific cases, the triager promised to reopen the ticket if i proved X. I proved X in both cases. I haven’t heard back yet.
But honestly? Coming from doing blackhat hacking 20-odd years ago, to playing CTFs for fun, and now transitioning to legitimate Bug Bounties is quite the journey. Even if it hasn’t yielded massive financial success yet, the validation is there. The machine works.
I am currently open for contractual engagements.
If you want this rig pointed at your infrastructure to find the holes before a state actor or a ransomware gang does, contact me. You can hire a consultancy that throws a junior pentester at your API for a week, or you can hire me and my army of 42+ AI agents.
Your choice.
Happy New Year.