BACKGROUND.sh
Once pulled gigs for Kiroshi Corporation, running network security audits and infrastructure hardening to earn enough eddies for the latest cyberware tech. Specialized in penetrating corporate firewalls and automating security protocols across their entire product line - from their flagship optics to neural processors and interface chips.
Everything changed when I discovered The Kiroshi Group's dirty secret: users who didn't purchase their premium maintenance and upgrade subscription were getting artificially throttled performance across their entire cyberware line. Premium eddies paid for top-tier hardware, but without the ongoing subscription, it was software-locked to underperform. This wasn't just about optics - their whole catalog of cyberoptic implants, scanners, and neural interfaces were being gimped unless you kept paying monthly tribute.
The Response? Cracked their entire cyberware DRM system and released the exploits to the Net. Every Kiroshi implant suddenly running at full spec, no subscription required. Hit them where it hurt most - their orbital programs and celebrity sponsorship deals.
Kiroshi's Retaliation? Permanent blacklist and legal threats. But here's the kicker - I hijacked their kiroshi.group domain during the chaos and now use it as my base of operations. Every time they see that domain, they're reminded of what happens when you screw over your customers.
CURRENT OPERATIONS
fortigate-cert-swap
// Written in Go because performance matters in the field
Status: [PRODUCTION] High-performance security tool
acme-deploy-fortigate
# Automated certificate deployment for corporate firewalls
# Because manual cert management is for script kiddies
Status: [MAINTAINED] Shell automation scripts
acme-deploy-mikrotik-api
# Turning routers into fortress walls
# Every netrunner's favorite chrome for the Net
Status: [ACTIVE] Network security automation
io.konnected.blaq
// Bypassing corporate IoT limitations since 2077
Status: [ACTIVE] TypeScript-based automation
NETWORK INFILTRATION STATS
SECURE COMMUNICATIONS
Domain Operations: kiroshi.group (Hijacked from Kiroshi Corp as payback)
Encrypted Comms: Available via secure channels only
Public Repository: You're looking at it, choom