The Undergrid is a space for hackers, tinkerers, and those who love exploring the darker side of the internet.
"I do see the beauty in the rules, the invisible code of chaos hiding behind the menacing face of order." — Elliot Alderson, Mr. Robot
That quote lives in the bio for a reason — it's the closest thing to a personal mission statement I have. Behind every system, every protocol, every access control, there's a logic waiting to be understood. Not broken. Understood. I'm 4c1d.burn — Paolo Grometto — red teamer and penetration tester based out of Santo Domingo, Dominican Republic.
Security research isn't just a job here — it's a lens. From web application pentesting and client engagements to CTF competitions and bug bounty hunting, the work spans the full offensive security stack. The Undergrid exists as the place to document all of it — the findings, the tools, the write-ups, the rabbit holes.
Wireless security is where the hobby lives. Not just as a professional discipline, but as genuine curiosity about the invisible layer of signals that surrounds everyone, everywhere. Sub-GHz protocols, RFID/NFC research, SDR analysis, RF captures — the kind of work that makes you see every hotel keycard and garage door differently. The Proxmark 3, the Flipper Zero, the T-Embed CC1101 — these aren't just tools, they're ways of reading a world most people don't know exists.
Wardriving is a regular one — GPS-equipped hardware scanning routes, capturing beacons, uploading to WiGLE.net under 4c1d.burn. Part of the ongoing wireless mapping obsession.
Outside of screens and signals — skateboarding. DEF CON 32 and 33 veteran. Always building something, always in the middle of at least three rabbit holes simultaneously.
The Undergrid exists to share knowledge, inspire curiosity, and explore the boundaries of technology. From RFID research to darknet navigation, wireless security to bug bounty hunting — this site covers the tools, techniques, and mindset of the underground tech community.
Everything published here is for educational and research purposes. The goal is to understand systems deeply — not to cause harm.
Deep dives, write-ups, and analysis on cybersecurity, hardware hacking, and underground tech culture.
Reviews, setup guides, and field notes on pentesting hardware and software — from Proxmark to Pineapple.
Open-source scripts, one-liners, and tools built for offensive security, automation, and research.
Vulnerability reports, methodology breakdowns, and tips from real engagements and hunting sessions.
Safe, responsible guides for navigating the dark web, understanding anonymity tools, and threat modeling.