I’m a seasoned Security Researcher, Penetration Tester, and Bug Bounty Hunter with a passion for uncovering vulnerabilities and securing systems. My approach to hacking is rooted in curiosity, creativity, and persistence. I believe that security isn’t just about mastering tools—it’s about understanding systems, thinking like an attacker, and crafting solutions that make a difference.
- 🔍 Skilled Penetration Tester: Specializing in Web, Mobile, API, AI/ML, and Network Security.
- 🛡️ Security Advocate: Passionate about ethical hacking, vulnerability research, and contributing to a safer digital world.
- 💻 Builder & Developer: Crafting custom exploits, tools, and automation scripts to solve complex problems.
- 🧠 Lifelong Learner: Always exploring new technologies, techniques, and methodologies to stay ahead in the ever-evolving cybersecurity landscape.
- Reported critical vulnerabilities to organizations like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, and Wageningen University & Research.
- Acknowledged with Hall of Fame (HOF) entries and official recognition letters for responsible disclosures.
- Discovered and reported multiple CVEs impacting widely-used software and systems.
- ✔️ Web Application Penetration Testing
- ✔️ Mobile Application Penetration Testing
- ✔️ API Penetration Testing
- ✔️ AI/ML Penetration Testing
- ✔️ Network Pentesting
- ✔️ Attack Surface Management (ASM)
- ✔️ CTFs & Capture The Flag Challenges
- ✔️ OSINT (Open Source Intelligence)
- ✔️ Thick Client Pentesting
- ✔️ Reverse Engineering
- ✔️ Source Code Review
- ✔️ Video Editing & Content Creation
- ✔️ Community Building
These open-source tools are designed to assist pentesters, security researchers, and bug bounty hunters in their workflows:
-
The Time Machine
A powerful recon tool leveraging Wayback Machine data to discover sensitive endpoints, subdomains, and potential vulnerabilities. -
ThreatTracer
A CVE checker and exploit enumerator for identifying vulnerabilities and public exploits against software components. -
WayBackLister
A reconnaissance tool to discover directory listings through archived URLs from the Wayback Machine. -
WayBackup Finder
A tool to identify backup files and sensitive data leaks via historical Wayback Machine snapshots. -
CVE Seeker
A utility to search for CVEs and related exploits efficiently. -
CrossInjector
A tool for automating Cross-Site Scripting (XSS) payload testing. -
What The Cipher
A cipher analysis and decryption tool for CTF challenges. -
Project Dork
A curated collection of Google Dorks for advanced OSINT. -
JIRA"YA - JIRA Yet Another Vulnerability Analyzer
A tool to analyze JIRA instances for misconfigurations and vulnerabilities. -
DKIM Lookup
A utility to verify DKIM records for email security assessments.
Note: These tools are intended for educational purposes only. Use responsibly and within authorized boundaries.
- CVE-2021-27539
- CVE-2022-33041
- CVE-2021-27295
- CVE-2021-27296
- CVE-2021-27190
- And more!
- "AI: Perilous Threat to Both Physical and Cyber Worlds"
Published in the Journal of Emerging Technologies and Innovative Research (JETIR).
Explores the dual-use nature of AI in cybersecurity and its implications for both defenders and attackers.
- Twitter – Follow me for insights, tools, and updates on security research.
- LinkedIn – Let’s connect professionally and discuss opportunities.
- Blog – Read my articles on cybersecurity, tools, and best practices.
- Instagram – Sneak peeks into my hacking journey and projects.
- 🔭 Currently working on advanced AI-driven security tools and research.
- 🌱 Learning more about cloud security, blockchain vulnerabilities, and quantum cryptography.
- 👯 Looking to collaborate on open-source security projects and tools.
- 🤔 Seeking feedback and ideas for improving existing tools.
- 💬 Feel free to ask me about anything related to cybersecurity, tools, or research!
- 📫 Reach out via Twitter DMs or LinkedIn.
I once spent 48 hours straight debugging a single line of code—and yes, it was worth it! 😄
All tools and content are released under the MIT License unless otherwise specified. Contributions are welcome—fork, modify, and submit pull requests to help improve these projects!



