CLASSIFIED: LinkedOut - Michael D Subrizi
CLASSIFIED
TOP SECRET

LinkedOut

MICHAEL D SUBRIZI

SECURITY CLEARANCE: LEVEL ALPHA

AGENT ID: ALPHA-117

DATE:

Failed to load image: SUBJECT_PHOTO_ID47.jpg (Error 403: Access Denied)

SUBJECT: Operation LinkedOut

MISSION: Intelligence gathering through digital surveillance and counter-intelligence operations.

STATUS: ACTIVE AND AVAILABLE FOR CONTRACTS

LAST KNOWN LOCATION: NYC COORDINATES

HANDLER:

AUTHORIZATION LEVEL: -CLASS

$ ./analyze_subject.sh --target="MICHAEL_D_SUBRIZI"
> ANALYZING CAPABILITIES...
> RED TEAM EXPERTISE: HIGH
> BLUE TEAM EXPERTISE: HIGH
> WRITING CAPABILITY: EXCEPTIONAL
> AVAILABLE FOR HIRE: TRUE

PERSONNEL RECORD: MICHAEL D SUBRIZI

IDENTIFIED CAPABILITIES

Storytelling Hacking Red Teaming Blue Teaming Penetration Testing LLM Hacking Branding Professional Writing Content Strategy Fashion Photography Teaching Game Development Workflow Creation Flutter AI Prompting Mastery

OPERATIONAL HISTORY

Content Strategist - Owner
Modern Dime
September 2024 - Present (9 months)
NYC

Founded digital bookstore in homage to St. Marks Books, City Lights, and Feltrinelli.

Provides guidance to creatives and entrepreneurs on implementing AI workflows for professional results.

Website: moderndimenovel.com

Hacker - Red Team LLM
Self
August 1986 - Present (38 years 10 months)
Cyberspace

Started on C64 and continues operations to present day. Original pirate (Sid Meier's, that is...).

Current status: ACTIVE

AVAILABLE FOR RED TEAM AND BLUE TEAM OPERATIONS

Storyteller for Brands, Publications, Legends, and the New York Underground
Brands, Film Studios, Game Studios, Publications, Novels · Contract
September 1998 - Present (26 years 9 months)
New York, New York, United States · Remote

I've spent 25+ years telling stories professionally – from the lofts and after hours of NYC's underground scene (CBGBS/Comedy Cellar/Duane Park), onto Wall Street, and later the lights of Paris Fashion Week.

The fashion world knows me through my work with Vogue Runway, Clinique, Lazaro, and Naeem Khan. Hollywood types passed my screenplays around offices at Universal, De Laurentiis, and Hallmark before Wendy Finerman (the Forrest Gump producer), Bill Murray, Monsterpants, and Forrest Whitaker tore into them. My camera work ended up in Rizzoli Books, Harpers UK, Vogue Italia, Elle Australia, V, W and Le Figaro when I wasn't looking. But that's all just notches on the bedpost.

I build aggressive workflows inspired by high-stakes sales/options trading (from my Arjent days), game/app dev (storywriter @ Pocket Gems), and the obsessive detail work I learned shooting Stella McCartney, Thom Browne, Moschino, Phillip Pleinn, and Tory Burch.

My attack is a battle-tested methodology of someone who's crawled through enough creative hellscapes to know which stories smack faces. Which mentors and friends to light incense and chant with. When to go all in and bet the farm.

Whether I'm designing shocking narrative workflows, training erotic romance fiction ai's or shooting Bella Hadid, I'm not interested in replacing the human magic – I'm amplifying it.

Developer
Modern Dime
April 2022 - Present (3 years)
NYC

Storyteller and hacker first, practical coder second - I build solutions to problems I encounter in my own workflow.

Security & Offensive Tools:

Hidden Bastard: System tool that exposes and eliminates the files Apple deliberately conceals from users (Swift, macOS)

WASP: Wireless adapter security framework for detecting compromised hardware before deployment in high-security environments (Python, NetworkSec)

Fare la Pecorina: Chrome extension demonstrating how "innocent" browser add-ons can monitor content, hook into Web3 providers, and track crypto transactions (JavaScript, Web3)

ImagePayloadInjection: Security research tool exposing how malicious code can be hidden in fashion photography deliverables (Python, Steganography)

Gaming & Creative Applications:

Pizza Connection: Retro-style strategy sim balancing pizzeria management with organized crime narratives - a tribute to the 90s classic (Unity, C#)

Hack, Love, Betray: Social engineering simulator disguised as a dating sim - teaching security awareness through narrative engagement (Ren'Py, Python)

CloudBreak: Meditation app featuring scientifically-validated breathing techniques with custom visualizations and ambient soundscapes (Flutter, Dart)

I leverage AI pair programming while maintaining absolute control over architecture and security considerations. My code reflects my hacker ethos: elegant solutions with just enough chaos to keep things interesting.

GitHub: github.com/MdrnDme

Ghost in the Prompt
Ghost in the Prompt
April 2025 - Present (2 months)
NYC

Status: WARNING: CLASSIFIED

Operation intended to replace compromised LinkedIn platform.

YouTube: @GhostinthePrompt

Owner, Breeder, Preservationist
Meteor Clone Farm
February 1997 - Present (28 years 4 months)
Mars

Cultivates and preserves numerous classified botanical specimens:

- Dread Bronson Haze (AH11 Bronson Cut x Dread Bread)

- Crippie (Miami Dankmaster), Banana OG (ORgnKid), Mango AJ Sour D (Original Brooklyn Crew)

- Affie (Afghan Landrace indica cultivated for 5 generations)

- Multiple other classified botanical specimens with specialized properties

Website: Meteor Clone Farm

TRAINING HISTORY

Regent College London

International Work Study Program

Activities and societies: Worked at LFC London First Center Investment Firm

Studied International Business and Film

Suffolk University - Sawyer Business School

Bachelor of Business Administration - BBA

Focus areas: Finance, Marketing, International Business, Economics

Activities and societies:

- Orientation Scholarship

- Literary Magazine Treasurer and Featured Writer/Spoken Word Artist

- Fitness Center Manager

- Griffin Honors Fellow

- Bartender - Bay Tower Room, Salty Dog, Club Envy, Museum of Fine Arts, etc

PROJECTS & CODE REPOSITORIES

claude-whisperer: The AI Hallucination Engine
A research toolkit that exposes and analyzes the vulnerabilities of advanced language models like Claude 4.0. Demonstrates how even the most robust AI safety guardrails can be bypassed through creative red teaming and adversarial testing.
Claude 4.0
AI Safety
Red Teaming
Security
Open Source
REPOSITORY
ImagePayloadInjection (IPI)
Open-source security research tool that detects and prevents malicious code hidden in image files, designed specifically for fashion's unique workflow and high-profile clients.
Python
Fashion Photography
Security Research
REPOSITORY
CloudBreak
A meditation app with 7 scientifically-backed breathing techniques, custom visualizations and ambient soundscapes.
Flutter
Dart
Mobile App
Meditation
REPOSITORY
Hidden Bastard
System tool that exposes and eliminates the files Apple deliberately conceals from users. Bypass macOS rootless protection with this lightweight utility.
Swift
macOS
Security
REPOSITORY
WASP
Wireless adapter security framework for detecting compromised hardware before deployment in high-security environments. Essential tool for secure system setup.
Python
NetworkSec
Security
REPOSITORY
Flea Flicker NetFilter
Advanced network filtering tool for penetration testing with experimental AI detection evasion capabilities. Features MAC spoofing, traffic mimicry, and advanced stealth modes inspired by football trick plays.
Python
Network Security
Penetration Testing
AI Evasion
Stealth Operations
REPOSITORY
Fare la Pecorina
Chrome extension demonstrating how "innocent" browser add-ons can monitor content, hook into Web3 providers, and track crypto transactions.
JavaScript
Web3
Security
REPOSITORY
Pizza Connection
Retro-style strategy sim balancing pizzeria management with organized crime narratives - a tribute to the 90s classic.
Unity
C#
Game Development
NDA PROJECT
Hack, Love, Betray
Social engineering simulator disguised as a dating sim - teaching security awareness through narrative engagement.
Ren'Py
Python
Game Development
NDA PROJECT

SECURE COMMUNICATION PROTOCOLS

For high-value contracts and classified operations:

Email: █████████████████████████

Signal: ████████ ████ ████████████

ProtonMail: █████████ ███ █████████ █████████████

CONTACT CHANNELS CLASSIFIED - AUTHORIZATION REQUIRED

SIERRA_EXPLOIT.exe - ACTIVE SESSION
×
$ ./initiate_target_scan.sh --visitor-ip=XXX.XXX.XXX.XXX
> Scanning target system...

WARNING: This agent operates independently. Any attempts to compromise this system or interfere with operations will result in immediate and proportional cyber retaliation.

I'll hack into your new fancy containers and break them if I want - at top price. Your move.

CLASSIFICATION LEVEL: EYES ONLY

DISTRIBUTION: AUTHORIZED PERSONNEL ONLY