Blog & Insights

Welcome to my blog, where I explore the intersection of cybersecurity, AI red teaming, and vulnerability research. Sharing technical deep dives, automation workflows, and real-world bug bounty experiences, including red-teaming and the research and exploitation of Web2 and Web3 vulnerabilities.

Understanding Prompt Injection and Emerging Security Risks in LLM Systems

Understanding Prompt Injection and Emerging Security Risks in LLM Systems

Offensive Security & Red Teaming
24 web-application hacking tools:

24 web-application hacking tools:

Bug Bounty & Vulnerability Research
20 Comprehensive Browser Extensions You Can’t Miss as a Bug Bounty Hunter

20 Comprehensive Browser Extensions You Can’t Miss as a Bug Bounty Hunter

Bug Bounty & Vulnerability Research
Comprehensive Reconnaissance Tools for Red Teaming and OSINT Operations

Comprehensive Reconnaissance Tools for Red Teaming and OSINT Operations

Offensive Security & Red Teaming
Advanced Tools and Techniques for Privilege Escalation

Advanced Tools and Techniques for Privilege Escalation

Offensive Security & Red Teaming
Comprehensive Phishing Tools for Red Teaming and Delivery Tactic

Comprehensive Phishing Tools for Red Teaming and Delivery Tactic

Offensive Security & Red Teaming
Improper Media Deletion How I Found Publicly Accessible Deleted Files

Improper Media Deletion How I Found Publicly Accessible Deleted Files

Bug Bounty & Vulnerability Research
How I Find Sensitive Information Leaks on GitHub (and a Real Example)

How I Find Sensitive Information Leaks on GitHub (and a Real Example)

Bug Bounty & Vulnerability Research
How I Bypassed Email Uniqueness: Exploiting Weak Access Control in a Bug Bounty Program

How I Bypassed Email Uniqueness: Exploiting Weak Access Control in a Bug Bounty Program

Bug Bounty & Vulnerability Research
Comprehensive Toolkit for Team Communication, Data Exfiltration, Log Aggregation, and Wireless & Embedded Device Hacking

Comprehensive Toolkit for Team Communication, Data Exfiltration, Log Aggregation, and Wireless & Embedded Device Hacking

Offensive Security & Red Teaming
Advanced C# Offensive Frameworks for Red Team Operations

Advanced C# Offensive Frameworks for Red Team Operations

Offensive Security & Red Teaming
page 1 of 8