Blog & Insights
Welcome to my blog, where I explore the intersection of cybersecurity, AI red teaming, and vulnerability research. Sharing technical deep dives, automation workflows, and real-world bug bounty experiences, including red-teaming and the research and exploitation of Web2 and Web3 vulnerabilities.

Improper Media Deletion How I Found Publicly Accessible Deleted Files
Bug Bounty & Vulnerability Research

How I Find Sensitive Information Leaks on GitHub (and a Real Example)
Bug Bounty & Vulnerability Research
page 1 of 8