I am a professional with expertise in Web Application Security, Mobile Security, Network Security, Cloud Security, Web Development, Penetration Testing, Source Code Reviewing, and Technical Writing. I also specialize in Smart Contract Development, Auditing, and DevSecOps. As a proactive Application Security Researcher, I safeguard companies from cyber threats by identifying and resolving vulnerabilities.
Blockchain/Web2 DevSecOps
Blockchain Security Auditor
Cybersecurity Engineer | Technical Writer
Cybersecurity Auditor & Penetration Tester
Penetration Tester
Penetration Tester
Chief Security Officer (CSO) | Penetration Tester | Smart Contract Auditor
Cybersecurity: Web App Security, Mobile Security, Network Security, Cloud Security, Penetration Testing, Source Code Reviewing, Technical Writing
Programming: HTML5, CSS, JavaScript, C, C++, PHP, Java, Python, Bash, Go, SQL, Solidity, Rust, Ruby, Visual Basic
Frameworks: Laravel, Ruby on Rails, Django, Flask, Express.js, React.js, Angular
Databases: Relational, Object-oriented, Hierarchical, Network
Server Technologies: Web, Proxy, FTP, Application, File, Database, Mail Servers, Virtual Machines
Blockchain/Web3: Ethereum, Binance, AWS/Azure Nodes, Filecoin, Swarm, Chainlink, OpenZeppelin
Operating Systems: Windows, Linux (Kali, Parrot, Ubuntu, Linux Mint, Black Arch)
Additional: Hardware troubleshooting, Installation & Maintenance, MS Office Suite
Google Dorking - A powerful technique for quickly discovering vulnerabilities using advanced search queries. Bug Bounty Hunters ...
Read MoreHTTP Request Smuggling is one of the advanced topics in web security that needs deep understanding on how...
Read MoreInsecure Direct Object References (or IDOR) is a simple bug that packs a punch...
Read MoreDirectory traversal (also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is...
Read MoreOS command injection (also known as shell injection) is a web security vulnerability that allows an attacker to execute...
Read MoreSpecial kind of cybersecurity competition designed to challenge its participants to solve computer...
Read MoreDon't like forms? Drop me an email.