_

SECURITY
RESEARCHER

Scroll to explore
Security Researcher & Bug Bounty Hunter

Breaking

 Systems

Building

 Security

I hunt vulnerabilities in web applications, APIs, and infrastructure. Turning security weaknesses into fortified systems.

intro.sh
$whoami
pentester@cyberspace
$cat mission.txt
Securing the digital world, one bug at a time

#About Me

Passionate about uncovering vulnerabilities and helping organizations build more secure systems

Technical Arsenal

Tools and technologies I work with

Web Application Security

OWASP Top 10
XSS
SQLi
SSRF
IDOR
CSRF

Pentesting Tools

Burp Suite
Metasploit
Nmap
SQLMap
Nuclei
FFUF

Programming

Python
JavaScript
Go
Bash
TypeScript

Expertise Level

Web App Pentesting
API Security
Network Security
Mobile Security
Cloud Security
500+
Bugs Reported
150+
Programs Hacked
$2M+
Bounties Earned
stats.txt
>HackerOne
Top 50 Researcher
>Bugcrowd
Level 5 Researcher
>Intigriti
Platinum Badge

#Featured Projects

Notable security research, tools, and bug bounty achievements

Critical Vulnerability in Major SaaS

Privilege escalation leading to full account takeover

Discovered and reported a critical IDOR vulnerability affecting millions of users. The flaw allowed unauthorized access to sensitive user data and account takeover.

IDOR
REST API
SSRF
$15,000 Bounty

Custom XSS Scanner Tool

Open-source automated vulnerability scanner

Built a lightweight, efficient XSS scanner using Python. Features include blind XSS detection, DOM-based XSS analysis, and comprehensive reporting.

Python
Selenium
BeautifulSoup
Open Source

Cloud Infrastructure Audit

Comprehensive security assessment for Fortune 500

Led a team to conduct red team engagement on cloud infrastructure. Identified 25+ critical vulnerabilities including misconfigured S3 buckets and IAM privilege escalations.

AWS
Azure
Terraform
Case Study

SQL Injection Research

Novel technique bypassing WAF protections

Researched and documented a new SQLi technique that bypasses major WAF solutions. Published technical write-up with proof-of-concept exploits.

SQLi
WAF Bypass
Research
Research Paper

Mobile App Security Audit

Banking application penetration testing

Conducted comprehensive security assessment of iOS and Android banking apps. Found critical vulnerabilities including insecure data storage and certificate pinning bypass.

Mobile
iOS
Android
Confidential

API Gateway Exploit Chain

Multi-step exploit leading to RCE

Chained multiple API vulnerabilities to achieve remote code execution. Demonstrated the importance of defense in depth and proper API security practices.

API
RCE
Exploit Chain
Technical Write-up

#Security Blog

Insights, tutorials, and vulnerability disclosures

December 2024

Advanced XSS Payloads

Crafting sophisticated cross-site scripting attacks

Deep dive into advanced XSS techniques including polyglots, blind XSS, and bypassing modern content security policies...

November 2024

Breaking WAF Protections

Techniques to bypass web application firewalls

Learn advanced techniques for bypassing WAF protections including encoding, fragmentation, and protocol manipulation...

October 2024

Automating Bug Hunting

Building your reconnaissance toolkit

How to build efficient automation tools for bug reconnaissance, including subdomain enumeration and vulnerability scanning...

#GitHub Repositories

Open-source projects and security tools

Web Security
★ 234

XSS-Payload-Generator

Advanced XSS payload generator with bypass techniques

A comprehensive tool for generating XSS payloads including polyglots, blind XSS, and WAF bypass techniques. Supports multiple encoding schemes.

Python
Flask
MIT
Updated 2d ago
Scanner
★ 567

VulnScanner-Pro

Automated vulnerability scanning framework

Multi-threaded vulnerability scanner with support for subdomain enumeration, port scanning, and automated attack vector detection.

Go
Goroutines
MIT
Updated 1w ago
Exploitation
★ 892

Exploit-Database

Curated collection of security exploits

A comprehensive database of CVEs and proof-of-concept exploits with search, filter, and vulnerability severity scoring.

Python
SQLite
MIT
Updated 3d ago
Tool
★ 445

API-Fuzzer

REST API fuzzing and testing tool

Advanced API fuzzer with support for authentication, rate limiting, custom payloads, and automated vulnerability detection.

Python
AsyncIO
MIT
Updated 5d ago
Security
★ 321

JWT-Decoder

JWT token analyzer and validator

Decode, validate, and analyze JWT tokens with support for multiple algorithms, common vulnerability detection, and signature verification.

TypeScript
Next.js
MIT
Updated 1w ago
Automation
★ 678

Auto-Recon

Automated reconnaissance toolkit

All-in-one reconnaissance tool for bug bounty hunters featuring subdomain finding, technology fingerprinting, and vulnerability scanning.

Bash
Python
MIT
Updated 2w ago

#Certifications

Professional credentials and industry recognition

OSCP

Offensive Security Certified Professional

2023

CEH

Certified Ethical Hacker

2022

GPEN

GIAC Penetration Tester

2023

CRTP

Certified Red Team Professional

2024