Blog & Insights

Welcome to my blog, where I explore the intersection of cybersecurity, AI red teaming, and vulnerability research. Sharing technical deep dives, automation workflows, and real-world bug bounty experiences, including red-teaming and the research and exploitation of Web2 and Web3 vulnerabilities.

Improper Media Deletion How I Found Publicly Accessible Deleted Files

Improper Media Deletion How I Found Publicly Accessible Deleted Files

Bug Bounty & Vulnerability Research
How I Find Sensitive Information Leaks on GitHub (and a Real Example)

How I Find Sensitive Information Leaks on GitHub (and a Real Example)

Bug Bounty & Vulnerability Research
page 1 of 8