I'm Jack Stone. I build things that break things — carefully, then I write down what I learned. This site is one of them.
My focus is offensive and defensive security tooling — things that scan, deceive, protect, and analyse at the edges of what a single binary can do.
I've been circling programming and security for about six years — most of that time as a curious reader poking at things. The last three or so have been the hands-on stretch, where I actually started building and breaking the things I used to only read about.
Outside the public repos I keep a home lab: a stable of VMs I use to detonate live malware samples against commercial antivirus products — and against a detection engine of my own that isn't public yet. It's the environment where "should work" gets kicked repeatedly until it either holds up or I understand exactly why it doesn't.
The projects below are built under YurilLAB: a reconnaissance framework (Kmap), an enterprise honeypot platform (QPot), and an anonymity transport layer designed against 20 years of Tor/I2P research attacks (GPTL). Each one is meant to stand on its own and to play well with the others.
Heads up: these projects are young and I'm the only one working on them. Expect rough edges, half-finished corners, and the occasional bug that slipped past me. If you find one — or want to argue about a design choice — open an issue on the repo. That's the fastest way to get it into the fix queue.
I'm drawn to the seam between offence and defence — the place where you can't really build one without thinking like the other. A scanner is a detector in reverse. A honeypot is an exploit chain watched from the other side of the glass. Most of what I build lives on that seam on purpose.
On a good day I'm reading a paper from 2003 about an attack I'd never heard of, finding that it still works against something shipping today, and then writing the smallest possible thing that either demonstrates it or stops it. That's the whole loop: read, try, write down what broke.
I'm also a bit of a tool nerd — I'll spend an evening sharpening a debugger workflow or a log pipeline if it means future-me spends less time squinting at output. Good tools pay back every session.
Outside the keyboard: home-lab hardware I've rebuilt more times than I should admit, write-ups from other people doing similar work, and the occasional CTF when I want a reality check on how much I still don't know.
A rough inventory — the languages, infrastructure, research, and specs that show up again and again across the projects above. Not a complete list, just the things I'd pull off the shelf first.
A fork of nmap extended with active pentesting and internet-scale reconnaissance. Adds default-credential probing (280+ built-in pairs), HTTP/S recon with 180+ high-value paths, a bundled 10,100+ CVE cross-reference database, PNG screenshots of discovered web ports, and a --net-scan pipeline that can discover, fingerprint, and catalogue services across the public IPv4 space. One binary, one SQLite file.
An enterprise-grade honeypot platform built on T-Pot CE with gVisor / Kata / Firecracker sandboxing, per-honeypot CPU/memory/PID limits, optional ClickHouse analytics, stealth & anti-fingerprinting, auto MITRE ATT&CK classification, automated IOC extraction, TTP session analysis, alert webhooks, and native integration with the Yuril Security suite. Packaged around a single Go CLI.
General Purpose Transport Layer — a next-generation anonymity network with named defences against 10 attack classes from 2005–2024 Tor/I2P/VPN research. Defences include WTF-PAD, Vanguards, RPKI-aware AS-diverse routing, Poisson-jittered timing, DoH/DoT, and a WebRTC guard, all layered under hybrid X25519 + ML-KEM-768 post-quantum key exchange. Three security levels (standard / enhanced / maximum) via the gptl CLI. Crypto is FIPS 140-3 through aws-lc-rs.
Best places to find me are GitHub and Discord. I'm happy to hear from people who want to collaborate, work together, or compare notes on something weird — whether that's a contract gig, a research idea, a CTF team, or just a bug report on one of the projects above.