Independent security research, consulting, and creative technical work. I break things carefully so you don't have to find out the hard way.
External and internal network assessments, web application testing, and targeted engagements. Findings delivered with clear reproduction steps and business-grade impact analysis.
Configuration review, hardening recommendations, and policy analysis. From single endpoints to full infrastructure. Focused on what actually reduces risk — not compliance theater.
USB forensics, compromised media investigation, suspicious file triage, and post-incident review. Structured reporting you can actually act on.
Prompt injection testing, LLM application review, and AI-assisted tooling for security workflows. Help teams adopt AI safely — or figure out where it's already quietly leaking data.
stonevisions is an independent practice run out of Fargo, North Dakota. Comfortable on the command line, fluent on both Windows and Linux, and unafraid of the low-level. I care about getting the details right.
Work spans traditional offensive security, mobile platform research, device forensics, and the occasional creative technical project — from rooting analysis to custom tooling.
I take on selective engagements and write things up honestly. If a problem is out of scope or better served by someone else, I'll say so.