About Me
Hi. I’m an independent offensive security researcher with 6+ years in the field. I specialize in network protocol vulnerabilities, firmware reverse engineering, and supply chain security.
I operate independently — finding vulnerabilities, publishing tools, and writing about the dark corners of modern systems.
All research is conducted under responsible disclosure frameworks. CVE acknowledgments, bug bounty, and red team work only.
Research Interests
- Web & API Security — auth bypasses, injection chains, business logic flaws
- Firmware & Embedded Systems — UART/JTAG extraction, binary diffing, bootloader analysis
- Supply Chain Security — package poisoning, CI/CD pipeline attacks, dependency confusion
- Malware Analysis — unpacking, C2 protocol reversing, persistence mechanisms
- Network Protocols — TLS misconfigurations, custom protocol fuzzing, ICS/SCADA
Stats
| CVEs Filed | 47 |
| Tools Published | 12 |
| Bug Bounties | Hall of Fame × 9 |
| Years Active | 6 |
Recognition
Recognition details coming soon.