Securing digital systems through ethical hacking, vulnerability research, and real-world security testing—helping organizations stay ahead of modern cyber threats.
I am a passionate and results-driven cybersecurity enthusiast with a strong focus on web application security, vulnerability assessment, and ethical hacking. My journey into cybersecurity began with a deep curiosity about how systems work—and how they can be broken and secured.
Currently, I specialize in identifying and exploiting vulnerabilities such as IDOR (Insecure Direct Object Reference), access control issues, and authentication flaws. I actively use tools like Burp Suite to perform manual and automated testing, including request manipulation, token analysis, and endpoint validation.
I have hands-on experience working with real-world targets through bug bounty programs, where I continuously improve my skills in vulnerability discovery, report writing, and responsible disclosure. My approach is detail-oriented and methodical, ensuring that no potential security gap is overlooked.
Beyond technical skills, I value persistence, continuous learning, and adaptability—qualities that are essential in the ever-evolving cybersecurity landscape. I am constantly exploring new attack techniques, automation strategies, and security frameworks to stay ahead.
In my free time, I enjoy practicing on labs, testing live applications, and learning advanced exploitation techniques. My goal is to become a highly skilled penetration tester and contribute to building safer digital environments.
Work Terms
Hours of Operation:
Available Monday to Saturday, with flexible hours depending on project requirements.
Communication:
Clear and professional communication is a priority. I prefer written communication via chat or email, with regular updates on progress and findings.
Work Approach:
Manual + automated security testing
Detailed vulnerability analysis
Clear, professional reporting with proof of concept
Responsible disclosure practices
Payment Terms:
Flexible depending on project scope—fixed price or hourly basis. Milestone-based payments are preferred for larger projects.
Turnaround Time:
Depends on the complexity of the engagement, but I ensure timely delivery without compromising quality.
Tools & Skills:
Burp Suite (Intruder, Repeater, Proxy)
Web Application Security Testing
IDOR & Access Control Testing
JWT Analysis & Manipulation
Basic scripting & automation
Attachments (Click to Preview)
-