About me

I'm a penetration tester with over 7 years of professional experience, with a proven track record of identifying critical vulnerabilities in Fortune 500 companies, government and banking applications, and, more recently, smart contracts. Skilled in both Web2 application security and Web3 smart contract auditing, with a continued focus on expanding expertise in both fields.

What i'm doing

  • design icon

    Web2 Security Research

    Identifying and responsibly disclosing vulnerabilities in web applications, APIs, and infrastructure for organizations worldwide.

  • Web development icon

    Web3 Security Research

    Auditing smart contracts and decentralized protocols to uncover vulnerabilities before they can be exploited on-chain.

What I've Dealt With

  • Python

    Python

    Built custom security tooling for vulnerability discovery — including scanners, fuzzers, and automation scripts used across real-world engagements.

  • JavaScript

    JavaScript

    Developed client-side exploits covering XSS, CSRF, and related attack vectors, with a focus on understanding how browsers can be weaponized against users.

  • PHP

    PHP

    Built web applications in PHP and tested multiple PHP applications — uncovering critical vulnerabilities including RCE, SQLi, and logic flaws in real-world PHP-based targets.

  • Solidity

    Solidity

    Audited smart contracts on Ethereum and EVM-compatible chains, identifying vulnerabilities such as reentrancy, access control issues, and logic flaws before deployment.

  • Java

    Java

    Developed mobile applications and tested both mobile and web Java-based targets on real-world engagements, uncovering a range of vulnerabilities.

  • .NET

    .NET

    Tested multiple .NET applications in real-world engagements, consistently uncovering critical vulnerabilities.

  • Django

    Django

    Built applications with Django and assessed Django-based targets, identifying misconfigurations, broken access controls, and logic flaws in real-world engagements.

  • WordPress

    WordPress

    Developed websites with WordPress and tested real-world WordPress targets, uncovering a range of vulnerabilities including plugin flaws, misconfigurations, and authorization issues.

  • React

    React

    Built web applications using React and tested React-based frontends for client-side vulnerabilities including XSS, client-side path traversal and others.

  • Node.JS

    Node.JS

    Developed backend services with Node.js and tested real-world targets.

  • Apache

    Apache

    Used for personal projects and tested on real-world engagements, identifying misconfigurations and security vulnerabilities.

  • Nginx

    Nginx

    Used Nginx in development as a web server and reverse proxy, and assessed it on live targets — uncovering misconfigurations, path traversal issues, and insecure proxy setups.

A Glimpse of My Targets

  • GitHub

    GitHub

    A cloud-based platform for version control and code collaboration, used by millions of developers to host and manage repositories.

  • AWS

    AWS

    Amazon's cloud computing platform offering a vast range of infrastructure and services including hosting, storage, and computing power.

  • Salesforce

    Salesforce

    A leading cloud-based CRM platform used by businesses to manage customer relationships, sales pipelines, and marketing.

  • Hostinger

    Hostinger

    A web hosting provider offering affordable domain, hosting, and website building services to individuals and businesses worldwide.

  • Zendesk

    Zendesk

    A customer service and support platform that helps businesses manage customer interactions across multiple channels.

  • Spotify

    Spotify

    A leading music and podcast streaming platform with hundreds of millions of users across the globe.

  • AT&T

    AT&T

    One of the largest American telecommunications companies, providing phone, internet, and media services to consumers and businesses.

Resume

icon

Experience

  1. Web2 Security Research

    2019 — Present

    Conducting independent security research on web applications, APIs, and infrastructure, responsibly disclosing vulnerabilities to companies including GitHub, Amazon, Salesforce, Spotify, and more.

  2. Penetration Testing @ Ras-IT

    2021 — Present

    Performing professional penetration tests on client web applications, networks, and infrastructure — including government and banking applications — delivering detailed vulnerability reports and remediation guidance to organizations across various industries.

  3. Web3 Security Research

    2024 — Present

    Expanding into the blockchain security space by reviewing Solidity smart contracts and decentralized protocols for logic flaws, reentrancy issues, and other on-chain attack vectors through competitive audit platforms.

icon

CVEs

  1. GitHub

    CVE-2026-3582

    A Missing Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints.

  2. WordPress

    CVE-2025-13746

    Cross-Site Scripting vulnerability made it possible for attackers to inject arbitrary scripts in pages that will execute whenever a user accesses an injected page.

  3. WordPress

    CVE-2026-2488

    A Missing Authorization vulnerability allowed attackers to delete arbitrary messages belonging to any user, due to a missing capability check on the pg_delete_msg() function.

  4. WordPress

    CVE-2026-1051

    Cross-Site Request Forgery issue allowed unauthenticated attackers to unsubscribe newsletter subscribers via a forged request granted they can trick a logged-in user into performing an action such as clicking on a link.

  5. WordPress

    CVE-2026-2494

    Due to missing nonce validation, it was possible for unauthenticated attackers to approve or deny group membership requests via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

icon

Education & Certifications

  1. Bachelors Degree in Computer Science

    2017 — 2021

    Completed a four-year degree covering core topics including software engineering, networking, algorithms, and more, which laid the foundation for a career in cybersecurity.

  2. INE Security eWPT

    2021

    Obtained the eLearnSecurity Web Application Penetration Tester certification, demonstrating hands-on proficiency in web application penetration testing methodologies and techniques. View Certificate

Blog