$ whoami

Security Researcher & Full-Stack Developer

Penetration tester specializing in web application security, bug bounty hunting, and CTF challenges. Building secure applications and sharing knowledge through writeups and walkthroughs.

$ ls ~/projects

Featured Projects

Web applications, security tools, and open-source contributions

Vulnerability Scanner

Vulnerability Scanner

Automated web application security scanner built with Python and Next.js dashboard

PythonNext.jsSecurity
Bug Bounty Toolkit

Bug Bounty Toolkit

Collection of tools and scripts for reconnaissance and exploitation in bug bounty programs

BashGoSecurity
CTF Platform

CTF Platform

Full-stack platform for hosting Capture The Flag competitions with real-time scoring

ReactNode.jsDocker
Secure Chat App

Secure Chat App

End-to-end encrypted messaging application with modern cryptography

TypeScriptWebRTCCrypto
$ cat writeups.md

Writeups & Walkthroughs

Detailed technical writeups from CTF competitions, bug bounties, and security research

CTFMedium

HTB Cyber Apocalypse CTF 2024 - Web Challenges

Complete walkthrough of all web exploitation challenges including XSS, SQL injection, and SSRF

WebXSSSQLi
Mar 15, 2024
Bug BountyCritical

Bug Bounty: Authentication Bypass in Major SaaS Platform

Discovered and disclosed a critical authentication bypass vulnerability leading to $5000 bounty

AuthLogic FlawAPI
Feb 28, 2024
HTBEasy

HackTheBox Machine: Analytics - Complete Walkthrough

Step-by-step guide to pwning Analytics machine featuring CVE exploitation and privilege escalation

LinuxCVEPrivEsc
Feb 10, 2024
ResearchHard

GraphQL Security: Finding Hidden Queries and Mutations

Advanced techniques for discovering and exploiting GraphQL introspection and hidden endpoints

GraphQLAPIIDOR
Jan 20, 2024
$ youtube-dl --list

Video Tutorials

Security tutorials, walkthroughs, and educational content on YouTube

Web Application Penetration Testing Full Course
2:34:15

Web Application Penetration Testing Full Course

45K views

Bug Bounty Methodology: Finding Your First Vulnerability
18:42

Bug Bounty Methodology: Finding Your First Vulnerability

32K views

Advanced XSS Exploitation Techniques
25:18

Advanced XSS Exploitation Techniques

28K views

Setting Up Your Bug Bounty Lab Environment
15:30

Setting Up Your Bug Bounty Lab Environment

19K views

$ contact --help

Get in Touch

Interested in collaboration, have a question, or want to discuss security research? Feel free to reach out.

Discord

username#0000

Location

Remote / Global