Skilled and adaptable team player. Builder, developer, problem solver and penetration tester. Hacking is not about mastering one tool or another. It is a process, a way of thinking. If I really want into a system, then I will opt for custom written malware/exploits that I write myself. In short I'm Consistent Security Researcher with the desire to make a difference.
I am a ๐พ Security Researcher and ๐ Bug bounty hunter in free time. Discovered and reported several vulnerabilities in projects with Honorable mentions/ Acknowledgement letters, like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, or Wageningen University & Research.
- โ๏ธ Web/Mobile Application Penetration Testing
- โ๏ธ CTFs
- โ๏ธ Networking
- โ๏ธ Noob in Coding :P still can code - Python , Javascript , NodeJS , C/C++, Solidity, Websites.
- โ๏ธ Research (Search my name over ExploitDB)
- โ๏ธ OSINT
- โ๏ธ Thick Client Pentesting
- โ๏ธ Reverse Engineering
- โ๏ธ Source code review
- โ๏ธ Network Pentesting
- โ๏ธ Video Editing
- โ๏ธ Building Communities
- The Time Machine
- ThreatTracer
- CVE Seeker
- CrossInjector
- What The Cipher
- Project Dork
- JIRA"YA - JIRA Yet Another vulnerability Analyzer
- DKIM Lookup
CVEs reported by me โ๏ธ
- CVE-2021-27539
- CVE-2022-33041
- CVE-2021-27295
- CVE-2021-27296
- CVE-2021-27190
- and more!!
Papers Published โ๏ธ
- AI: perilous threat to both physical and cyber world Published at Journal of Emerging Technologies and Innovative Research