Skilled and adaptable team player. Builder, developer, problem solver and penetration tester. Hacking is not about mastering one tool or another. It is a process, a way of thinking. If I really want into a system, then I will opt for custom written malware/exploits that I write myself. In short I'm Consistent Security Researcher with the desire to make a difference.
I am a 👾 Security Researcher and 🔏 Bug bounty hunter in free time. Discovered and reported several vulnerabilities in projects with Honorable mentions/ Acknowledgement letters, like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, or Wageningen University & Research.
- ✔️ Web/Mobile Application Penetration Testing
- ✔️ CTFs
- ✔️ Networking
- ✔️ Noob in Coding :P still can code - Python , Javascript , NodeJS , C/C++, Solidity, Websites.
- ✔️ Research (Search my name over ExploitDB)
- ✔️ OSINT
- ✔️ Thick Client Pentesting
- ✔️ Reverse Engineering
- ✔️ Source code review
- ✔️ Network Pentesting
- ✔️ Video Editing
- ✔️ Building Communities
- CVE Seeker
- The Time Machine
- CrossInjector
- What The Cipher
- Project Dork
- ThreatTracer
- JIRA"YA - JIRA Yet Another vulnerability Analyzer
CVEs reported by me ⚔️
- CVE-2021-27539
- CVE-2022-33041
- CVE-2021-27295
- CVE-2021-27296
- CVE-2021-27190
- AI: perilous threat to both physical and cyber world Published at Journal of Emerging Technologies and Innovative Research