Bug Bounty
Attack surface exploration, hypothesis-driven testing and validation focused on impact, not noise.
I break down web attack surfaces, build offensive tooling and turn weak signals into real findings.
Bug Bounty · Research · Tooling · Teaching
I work across bug bounty, offensive security research, tooling and education, with a strong bias toward practical execution. The goal is simple: reduce noise, move faster and make technical judgment scalable.
Attack surface exploration, hypothesis-driven testing and validation focused on impact, not noise.
Turning weak technical signals into reproducible findings with clear security value.
Building tooling that removes repetitive friction from recon, triage and validation.
Teaching offensive security through execution, workflow and applied reasoning.
A selection of projects and work that reflects how I build, research and approach offensive security in practice.
Personal environment configuration built to optimize workflow, reduce friction and keep offensive security operations fast, consistent and reproducible.
View project →Tooling focused on web attack surface visibility, technical analysis and faster validation during offensive security workflows.
View project →Multiple valid Bugcrowd submissions, including two accepted reports on NASA-related targets.
Learn more →Available for collaborations, cybersecurity training and selected technical projects.
Professional profile, background, training and networking.
Direct contact for collaborations, proposals and professional inquiries.
Repositories, utilities, tools and technical projects.