Penetration tester and security researcher specializing in web application security, network infrastructure, and vulnerability research. I break things to help build them better.
05 // Hall of Fame
Vulnerabilities responsibly disclosed to organizations worldwide. All details withheld per coordinated disclosure agreements.
// Details withheld per responsible disclosure policy
01 // About
I'm a security researcher with deep expertise in penetration testing, web application security, and network security. My work sits at the intersection of offensive and defensive security — understanding how attackers think to build more resilient systems.
With a background in both red team operations and vulnerability research, I've worked with organizations across fintech, healthcare, and critical infrastructure to identify and remediate high-severity vulnerabilities before adversaries can exploit them.
I contribute to the security community through responsible disclosure, CTF competitions, and open-source tooling for the offensive security community.
02 // Skills
03 // Work
Discovered a critical authentication bypass vulnerability in a widely-deployed enterprise SSO platform affecting 10,000+ organizations. The flaw allowed full account takeover via a JWT signature confusion attack without valid credentials.
Chained an open redirect with an SSRF vulnerability to exfiltrate AWS EC2 instance metadata including IAM credentials, leading to full cloud account compromise.
02Full Active Directory domain compromise achieved during red team engagement by chaining Kerberoasting, password spraying, and DCSync attack to gain Domain Admin.
03Built an open-source automated web reconnaissance framework integrating 30+ tools into a unified pipeline. 2,000+ GitHub stars. Used by CTF players and pentesters worldwide.
04Captured first place in the National Cybersecurity CTF Bangladesh 2024, solving 47 of 50 challenges across web, forensics, cryptography, and binary exploitation.
0504 // Contact
Available for penetration testing engagements, bug bounty collaborations, security consulting, and responsible disclosure conversations. Response time typically within 24 hours.
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBF...REPLACE WITH YOUR ACTUAL PGP KEY...ABAAKCRAm
7gK3xQRpAJ9...XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key ID: 0xDEADBEEF
Fingerprint: XXXX XXXX XXXX XXXX XXXX
XXXX XXXX XXXX XXXX XXXX
-----END PGP PUBLIC KEY BLOCK-----