Iβm a seasoned Security Researcher, Penetration Tester, and Bug Bounty Hunter with a passion for uncovering vulnerabilities and securing systems. My approach to hacking is rooted in curiosity, creativity, and persistence. I believe that security isnβt just about mastering toolsβitβs about understanding systems, thinking like an attacker, and crafting solutions that make a difference.
- π Skilled Penetration Tester: Specializing in Web, Mobile, API, AI/ML, and Network Security.
- π‘οΈ Security Advocate: Passionate about ethical hacking, vulnerability research, and contributing to a safer digital world.
- π» Builder & Developer: Crafting custom exploits, tools, and automation scripts to solve complex problems.
- π§ Lifelong Learner: Always exploring new technologies, techniques, and methodologies to stay ahead in the ever-evolving cybersecurity landscape.
- Reported critical vulnerabilities to organizations like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, and Wageningen University & Research.
- Acknowledged with Hall of Fame (HOF) entries and official recognition letters for responsible disclosures.
- Discovered and reported multiple CVEs impacting widely-used software and systems.
- βοΈ Web Application Penetration Testing
- βοΈ Mobile Application Penetration Testing
- βοΈ API Penetration Testing
- βοΈ AI/ML Penetration Testing
- βοΈ Network Pentesting
- βοΈ Attack Surface Management (ASM)
- βοΈ CTFs & Capture The Flag Challenges
- βοΈ OSINT (Open Source Intelligence)
- βοΈ Thick Client Pentesting
- βοΈ Reverse Engineering
- βοΈ Source Code Review
- βοΈ Video Editing & Content Creation
- βοΈ Community Building
These open-source tools are designed to assist pentesters, security researchers, and bug bounty hunters in their workflows:
-
The Time Machine
A powerful recon tool leveraging Wayback Machine data to discover sensitive endpoints, subdomains, and potential vulnerabilities. -
ThreatTracer
A CVE checker and exploit enumerator for identifying vulnerabilities and public exploits against software components. -
WayBackLister
A reconnaissance tool to discover directory listings through archived URLs from the Wayback Machine. -
WayBackup Finder
A tool to identify backup files and sensitive data leaks via historical Wayback Machine snapshots. -
CVE Seeker
A utility to search for CVEs and related exploits efficiently. -
CrossInjector
A tool for automating Cross-Site Scripting (XSS) payload testing. -
What The Cipher
A cipher analysis and decryption tool for CTF challenges. -
Project Dork
A curated collection of Google Dorks for advanced OSINT. -
JIRA"YA - JIRA Yet Another Vulnerability Analyzer
A tool to analyze JIRA instances for misconfigurations and vulnerabilities. -
DKIM Lookup
A utility to verify DKIM records for email security assessments.
Note: These tools are intended for educational purposes only. Use responsibly and within authorized boundaries.
- CVE-2021-27539
- CVE-2022-33041
- CVE-2021-27295
- CVE-2021-27296
- CVE-2021-27190
- And more!
- "AI: Perilous Threat to Both Physical and Cyber Worlds"
Published in the Journal of Emerging Technologies and Innovative Research (JETIR).
Explores the dual-use nature of AI in cybersecurity and its implications for both defenders and attackers.
- Twitter β Follow me for insights, tools, and updates on security research.
- LinkedIn β Letβs connect professionally and discuss opportunities.
- Blog β Read my articles on cybersecurity, tools, and best practices.
- Instagram β Sneak peeks into my hacking journey and projects.
- π Currently working on advanced AI-driven security tools and research.
- π± Learning more about cloud security, blockchain vulnerabilities, and quantum cryptography.
- π― Looking to collaborate on open-source security projects and tools.
- π€ Seeking feedback and ideas for improving existing tools.
- π¬ Feel free to ask me about anything related to cybersecurity, tools, or research!
- π« Reach out via Twitter DMs or LinkedIn.
I once spent 48 hours straight debugging a single line of codeβand yes, it was worth it! π
All tools and content are released under the MIT License unless otherwise specified. Contributions are welcomeβfork, modify, and submit pull requests to help improve these projects!