Blog & Insights
Welcome to my blog, where I explore the intersection of cybersecurity, AI red teaming, and vulnerability research. Sharing technical deep dives, automation workflows, and real-world bug bounty experiences, including red-teaming and the research and exploitation of Web2 and Web3 vulnerabilities.

20 Comprehensive Browser Extensions You Can’t Miss as a Bug Bounty Hunter
Bug Bounty & Vulnerability Research

Comprehensive Reconnaissance Tools for Red Teaming and OSINT Operations
Offensive Security & Red Teaming

Advanced Tools and Techniques for Privilege Escalation
Offensive Security & Red Teaming

Comprehensive Phishing Tools for Red Teaming and Delivery Tactic
Offensive Security & Red Teaming

Improper Media Deletion How I Found Publicly Accessible Deleted Files
Bug Bounty & Vulnerability Research

How I Find Sensitive Information Leaks on GitHub (and a Real Example)
Bug Bounty & Vulnerability Research

How I Bypassed Email Uniqueness: Exploiting Weak Access Control in a Bug Bounty Program
Bug Bounty & Vulnerability Research

Comprehensive Toolkit for Team Communication, Data Exfiltration, Log Aggregation, and Wireless & Embedded Device Hacking
Offensive Security & Red Teaming

Advanced C# Offensive Frameworks for Red Team Operations
Offensive Security & Red Teaming
page 1 of 8