ExposeBox
ExposeBox
ExposeBox delivers a smart growth marketing solution that allows its users to save time and money without the need to juggle multiple platforms and patched-up solutions.
ExposeBox delivers a smart growth marketing solution that allows its users to save time and money without the need to juggle multiple platforms and patched-up solutions.
My role
UX - UI - Product
Year
2020
My role
UX - UI - Product
Year
2020
VIBE
Vibe is a dashboard generator, creating customize dashboards per user's need.
the clients are the major telco companies and big data organization.
My role
UX
Year
2015
VIBE
Vibe is a dashboard generator, creating customize dashboards per user's need.
the clients are the major telco companies and big data organization.
My role
UX
Year
2015
VIBE
Vibe is a dashboard generator, creating customize dashboards per user's need.
the clients are the major telco companies and big data organization.
My role
UX
Year
2015
VIBE
Vibe is a dashboard generator, creating customize dashboards per user's need.
the clients are the major telco companies and big data organization.
My role
UX
Year
2015
Social media dashboard
A social management tool to coordinate brand social presence across multiple channels and accounts in one single interface.
My role
Concept
Year
2018
Social media dashboard
A social management tool to coordinate brand social presence across multiple channels and accounts in one single interface.
My role
Concept
Year
2018
ExposeBox
ExposeBox delivers a smart growth marketing solution that allows its users to save time and money without the need to juggle multiple platforms and patched-up solutions.
My role
UX - UI - Product
Year
2020
Wirex
The struggle with a lack of context, ineffective tools and even the skills to properly investigate are at the heart of the problem in security investigations. Once a potential incident has been identified, WireX quickly provides you the necessary intelligence to take action
My role
UX - UI - Product
Year
2017-8
Virtual Wallet
On-line wallet for virtual coins, this project was part of a POC made for a crypto start-up. they wanted to create simple fast and slick virtual wallet where all necessary actions are easy and accessible
My role
UX - UI - Product
Year
2019
Wenspire
Wenspire uses the power of AI and Information Theory to provide companies with the first API security and analytics platform. Acting like a powerful and fully-automated x-ray machine in the background, Wenspire’s platform continuously maps all APIs used by a company and analyzes API communication to discover anomalies and threats and provide insights.
My role
UX - UI - Product
Year
2019
Wenspire
Wenspire uses the power of AI and Information Theory to provide companies with the first API security and analytics platform. Acting like a powerful and fully-automated x-ray machine in the background, Wenspire’s platform continuously maps all APIs used by a company and analyzes API communication to discover anomalies and threats and provide insights.
My role
UX - UI - Product
Year
2019
Wirex
The struggle with a lack of context, ineffective tools and even the skills to properly investigate are at the heart of the problem in security investigations. Once a potential incident has been identified, WireX quickly provides you the necessary intelligence to take action
My role
UX - UI - Product
Year
2017-8
Wirex
The struggle with a lack of context, ineffective tools and even the skills to properly investigate are at the heart of the problem in security investigations. Once a potential incident has been identified, WireX quickly provides you the necessary intelligence to take action
My role
UX - UI - Product
Year
2017-8
ASM-Hud
ASM-Hud is an investigative cybersecurity interface that helps analysts understand complex environments in seconds. Instead of searching through logs, dashboards, and external tools, ASM-Hud rebuilds the environment into an explorable topology that reveals risks analysts didn’t even know to look for.
Vibe Coding (side-project)
2025


This project is part of an ongoing Vibe Coding side-project I’m building with a partner.
It's our playground for experimenting with new UX patterns, data models, and visual investigation tools. It’s not a commercial product, but a research and prototyping space where we explore ideas that break away from traditional security tools.
For us, it’s a way to test how far we can push UX, technology and AI-driven tools,
and to explore concepts and ideas that no company would ever let us try.

The problem:
Unknown Unknowns
Most security tools only surface what analysts already expect to find, revealing the obvious.
But the real dangers hide between the lines: in orphan assets, silent connections, unusual communication patterns, and behaviours that security tools often fail to expose. These blind spots remain invisible until they cause real damage. ASM-Hud is designed to surface them, turning the hidden into something clear, traceable and actionable.
Start Exploring
with a Single
Input
It all starts with a single input. The user enters any domain or website they want to explore, and the model immediately begins scanning the environment, discovering endpoints, services, connections and assets.
Within seconds it collects enough signals for the system to rebuild everything into a coherent structure. The map begins to take shape, and the entire environment becomes something the user can actually understand and explore.

Transform Chaos
Into a Starting
Point
With thousands of assets in every environment, analysts often don’t even know where to begin. So instead of giving them another endless table, we turned that infinity into a clear starting point.
The system visualises the entire environment as an explorable topology where users can move through the landscape, understand who’s connected to what, and see the real status of every asset.

Different Questions Need Different Views
Different investigations require different perspectives.
That is why the system includes a set of lenses that reshape the entire map depending on the question being asked.
The user can switch the view to explore assets by risk level, reveal anomalies across different environments, or group assets by product and functionality.
Each lens reorganizes the topology into a new story, allowing the analyst to uncover patterns, relationships, and brings the right context to the surface.

AI That Sees
What Analysts
Don’t Think to
Look For
After the scan completes, the system places a thin layer of insights on top of the map, revealing areas in the environment that are worth exploring.
These hints are not alerts. They are gentle entry points for investigation (it can surface problematic assets, a potential misconfiguration, suspicious behaviours, or communication paths that break the expected structure).
The AI acts as an expert companion. It understands the data, connects the dots, and identifies patterns no one thought to search for.
It is surprisingly helpful to discover that 21 assets in your environment have high exposure, or that 18% of your system is not monitored at all.

