// initializing profile
Cybersecurity Specialist & Pentester
1st-year B.Sc. Computer Science with Cyber Security at SRCAS. 6+ years in cybersecurity — pentester with proven strengths in networking, Linux, and ethical hacking.
About Me
Live process view — skills, tools, and stats as a running system.
Loading...
Click to see another
Experience
Commit history — from first exploit to formal education.
Projects
Live-fetched from GitHub. Click any row to inspect.
Writeups
Vulnerability research, CTF writeups, and bug bounty findings.
Discovered an IDOR vulnerability allowing unauthorized access to any user profile.
By manipulating the user_id parameter, an attacker could read, modify, or delete any
account without authentication.
Full attack chain to Domain Admin via Kerberoasting, Pass-the-Hash, and BloodHound path analysis from foothold to full domain compromise.
Stack-based buffer overflow using pwntools cyclic() to find offset,
overwrote return address to redirect to win() for shell access. ASLR defeated via fixed
offset.
Sent 802.11 deauth frames to force disconnection, stood up Evil Twin AP, captured WPA2 4-way handshakes, cracked PSK offline with Hashcat using wordlist + rules.
Contact
Open for projects, collaborations, and opportunities.