Blog & Insights

Welcome to my blog, where I explore the intersection of cybersecurity, AI red teaming, and vulnerability research. Sharing technical deep dives, automation workflows, and real-world bug bounty experiences, including red-teaming and the research and exploitation of Web2 and Web3 vulnerabilities.

20 Comprehensive Browser Extensions You Can’t Miss as a Bug Bounty Hunter

20 Comprehensive Browser Extensions You Can’t Miss as a Bug Bounty Hunter

Bug Bounty & Vulnerability Research
Comprehensive Reconnaissance Tools for Red Teaming and OSINT Operations

Comprehensive Reconnaissance Tools for Red Teaming and OSINT Operations

Offensive Security & Red Teaming
Advanced Tools and Techniques for Privilege Escalation

Advanced Tools and Techniques for Privilege Escalation

Offensive Security & Red Teaming
Comprehensive Phishing Tools for Red Teaming and Delivery Tactic

Comprehensive Phishing Tools for Red Teaming and Delivery Tactic

Offensive Security & Red Teaming
Improper Media Deletion How I Found Publicly Accessible Deleted Files

Improper Media Deletion How I Found Publicly Accessible Deleted Files

Bug Bounty & Vulnerability Research
How I Find Sensitive Information Leaks on GitHub (and a Real Example)

How I Find Sensitive Information Leaks on GitHub (and a Real Example)

Bug Bounty & Vulnerability Research
How I Bypassed Email Uniqueness: Exploiting Weak Access Control in a Bug Bounty Program

How I Bypassed Email Uniqueness: Exploiting Weak Access Control in a Bug Bounty Program

Bug Bounty & Vulnerability Research
Comprehensive Toolkit for Team Communication, Data Exfiltration, Log Aggregation, and Wireless & Embedded Device Hacking

Comprehensive Toolkit for Team Communication, Data Exfiltration, Log Aggregation, and Wireless & Embedded Device Hacking

Offensive Security & Red Teaming
Advanced C# Offensive Frameworks for Red Team Operations

Advanced C# Offensive Frameworks for Red Team Operations

Offensive Security & Red Teaming
page 1 of 8