Iโm a seasoned Security Researcher, Penetration Tester, and Bug Bounty Hunter with a passion for uncovering vulnerabilities and securing systems. My approach to hacking is rooted in curiosity, creativity, and persistence. I believe that security isnโt just about mastering toolsโitโs about understanding systems, thinking like an attacker, and crafting solutions that make a difference.
- ๐ Skilled Penetration Tester: Specializing in Web, Mobile, API, AI/ML, and Network Security.
- ๐ก๏ธ Security Advocate: Passionate about ethical hacking, vulnerability research, and contributing to a safer digital world.
- ๐ป Builder & Developer: Crafting custom exploits, tools, and automation scripts to solve complex problems.
- ๐ง Lifelong Learner: Always exploring new technologies, techniques, and methodologies to stay ahead in the ever-evolving cybersecurity landscape.
- Reported critical vulnerabilities to organizations like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, and Wageningen University & Research.
- Acknowledged with Hall of Fame (HOF) entries and official recognition letters for responsible disclosures.
- Discovered and reported multiple CVEs impacting widely-used software and systems.
- โ๏ธ Web Application Penetration Testing
- โ๏ธ Mobile Application Penetration Testing
- โ๏ธ API Penetration Testing
- โ๏ธ AI/ML Penetration Testing
- โ๏ธ Network Pentesting
- โ๏ธ Attack Surface Management (ASM)
- โ๏ธ CTFs & Capture The Flag Challenges
- โ๏ธ OSINT (Open Source Intelligence)
- โ๏ธ Thick Client Pentesting
- โ๏ธ Reverse Engineering
- โ๏ธ Source Code Review
- โ๏ธ Video Editing & Content Creation
- โ๏ธ Community Building
These open-source tools are designed to assist pentesters, security researchers, and bug bounty hunters in their workflows:
-
The Time Machine
A powerful recon tool leveraging Wayback Machine data to discover sensitive endpoints, subdomains, and potential vulnerabilities. -
ThreatTracer
A CVE checker and exploit enumerator for identifying vulnerabilities and public exploits against software components. -
WayBackLister
A reconnaissance tool to discover directory listings through archived URLs from the Wayback Machine. -
WayBackup Finder
A tool to identify backup files and sensitive data leaks via historical Wayback Machine snapshots. -
CVE Seeker
A utility to search for CVEs and related exploits efficiently. -
CrossInjector
A tool for automating Cross-Site Scripting (XSS) payload testing. -
What The Cipher
A cipher analysis and decryption tool for CTF challenges. -
Project Dork
A curated collection of Google Dorks for advanced OSINT. -
JIRA"YA - JIRA Yet Another Vulnerability Analyzer
A tool to analyze JIRA instances for misconfigurations and vulnerabilities. -
DKIM Lookup
A utility to verify DKIM records for email security assessments.
Note: These tools are intended for educational purposes only. Use responsibly and within authorized boundaries.
- CVE-2021-27539
- CVE-2022-33041
- CVE-2021-27295
- CVE-2021-27296
- CVE-2021-27190
- And more!
- "AI: Perilous Threat to Both Physical and Cyber Worlds"
Published in the Journal of Emerging Technologies and Innovative Research (JETIR).
Explores the dual-use nature of AI in cybersecurity and its implications for both defenders and attackers.
- Twitter โ Follow me for insights, tools, and updates on security research.
- LinkedIn โ Letโs connect professionally and discuss opportunities.
- Blog โ Read my articles on cybersecurity, tools, and best practices.
- Instagram โ Sneak peeks into my hacking journey and projects.
- ๐ญ Currently working on advanced AI-driven security tools and research.
- ๐ฑ Learning more about cloud security, blockchain vulnerabilities, and quantum cryptography.
- ๐ฏ Looking to collaborate on open-source security projects and tools.
- ๐ค Seeking feedback and ideas for improving existing tools.
- ๐ฌ Feel free to ask me about anything related to cybersecurity, tools, or research!
- ๐ซ Reach out via Twitter DMs or LinkedIn.
I once spent 48 hours straight debugging a single line of codeโand yes, it was worth it! ๐
All tools and content are released under the MIT License unless otherwise specified. Contributions are welcomeโfork, modify, and submit pull requests to help improve these projects!



