Web Application Penetration Tester with nearly 2 years of hands-on bug bounty experience. Expert in OWASP Top 10, attack surface mapping, and responsible disclosure on HackerOne & Bugcrowd.
I'm a Web Application Penetration Tester specializing in bug bounty research with nearly 2 years of real-world experience on HackerOne and Bugcrowd platforms.
My work spans end-to-end penetration testing on production targets — identifying authorization issues, IDORs, input validation flaws, CORS misconfigurations, and business logic vulnerabilities through structured reconnaissance and attack surface mapping.
I build custom Python automation tooling to accelerate recon workflows and author professional vulnerability reports with PoC, impact assessment, and remediation guidance.
Alongside offensive security, I have foundational experience in SOC operations, SIEM monitoring, and cloud security across AWS and Azure environments.
Python-based automation toolkit to streamline reconnaissance and asset discovery. Integrates multiple security tools to reduce manual effort and maximize attack surface coverage.
High-performance domain analysis tool with concurrent scanning, subdomain discovery, DNS/WHOIS analysis, port scanning, SSL & WAF detection, and structured security reporting.
Designed and deployed a serverless application using AWS Lambda with IAM role-based access control. Analyzed security for event-driven and serverless architectures.
Open to security roles, bug bounty collaborations, and interesting projects.
Opens your default mail app — iOS Mail, Gmail, Outlook & more.