- Web App Exploitation (OWASP Top 10)
- Privilege Escalation (Linux/Windows)
- Burp Suite Professional
- Network Enumeration
Bug Bounty Hunter. Cyber Defense Specialist. CTF Player.
Current Global Rank: Top 4%.
Constantly sharpening offensive skills on the battlefield.
Status: Active // Specialized Training
Participation in a high-security government defense program. Details regarding location, specific training modules, and unit designation are classified.
>> ACCESS DENIED: Clearance Level Insufficient.
Shifted focus to offensive security operations. Active participant in CTFs and Bug Bounty programs (HackerOne, Private Programs).
Strong foundation in software architecture. Understanding how code is built is my greatest asset in breaking it.
Focus: Bug Bounties & Pentesting
Focus: Hardening & Analysis
Automated script for subdomain enumeration and port scanning to identify low-hanging fruit in bounty programs.
Virtualized environment running Wazuh and Suricata to analyze real-time attack vectors and malware behavior.
Detailed documentation of solved boxes on TryHackMe (Top 4%) and HackTheBox.
Open for Bug Bounty collaborations and security discussions.