I'm a cybersecurity enthusiast dedicated to building secure, resilient digital infrastructures capable of withstanding modern threats. My passion lies at the intersection of offensive security and defense-in-depth strategies—uncovering vulnerabilities not just to expose weaknesses, but to strengthen systems against real-world attacks.
I served as a Junior Penetration Tester at Fetlla, for six months where I specialize in web application and Android application security. I conduct comprehensive security assessments, identify vulnerabilities, and provide actionable insights to ensure our clients' platforms meet industry standards and deliver secure, reliable user experiences.
My journey into cybersecurity has been shaped by hands-on experience across diverse environments—from bug bounty platforms and CTF competitions to formal labs and certifications. These experiences have equipped me with a well-rounded understanding of attacker methodologies and defensive strategies.
In my spare time, I stay engaged with the latest security research, participate in bug bounty programs, and explore creative techniques for bypassing security controls.
- 
                            2025 Mar — 2025 SepJunior Penetration Tester · FetllaConduct comprehensive penetration testing on web applications, Android applications, APIs, and network infrastructure. Identify and exploit security vulnerabilities using industry-standard methodologies. Create detailed reports with proof-of-concepts and remediation recommendations. Collaborate with development teams to implement security fixes and best practices. 
- 
                            2023 — PRESENTIndependent Bug Bounty HunterActively participate in public and private bug bounty programs on platforms like HackerOne, Bugcrowd and yeswehack. Proactively discover and report security vulnerabilities in web applications and Android applications. Develop proof-of-concept exploits and write clear, concise vulnerability reports with actionable remediation steps, contributing to the enhancement of real-world application security. 
- 
                            Web Application SecurityExpert in identifying OWASP Top 10 vulnerabilities, conducting manual testing, and using automated tools to assess web application security posture. 
- 
                            Network Penetration TestingProficient in network reconnaissance, vulnerability scanning, exploitation, and post-exploitation techniques using industry-standard tools. 
- 
                            Security ReportingStrong technical writing skills for creating comprehensive penetration testing reports with clear remediation steps for technical and non-technical audiences. 
- 
                            Android Application SecurityProficient in testing Android applications for common vulnerabilities like insecure data storage, broken cryptography, insecure communication, and client-side injection. Experienced with static and dynamic analysis tools and methodologies specific to mobile security. 
- 
                            Vulnerability Research & DisclosureAdept at independently discovering security flaws in various systems and applications. Skilled in developing proof-of-concept exploits and adhering to responsible disclosure practices to ensure timely and effective remediation of identified vulnerabilities. 
- 
                            AI-Assisted Scripting & AutomationLeveraging AI tools to enhance scripting for automation, task streamlining, and personal security-related projects. Focused on developing efficient command-line utilities and workflows. 
Projects & Write-ups
- 
                            2024 SEPTEMBERHack Havoc CTF Write-up: SolutionsDetailed write-up covering multiple challenges from the "Hack Havoc" CTF hosted by CyberMaterial. This entry showcases a diverse range of cybersecurity skills, including: - Web Exploitation: Identifying and exploiting vulnerabilities like directory traversal, command injection, and Server-Side Template Injection (SSTI).
- OSINT (Open-Source Intelligence): Leveraging social media, public records, and image analysis to gather crucial information and solve puzzles.
- Cryptography: Deciphering various encoding and encryption schemes (e.g., Base58, Base64, Base92, ROT47, XOR, Trithemius cipher, Braille ASCII, Maritime Signal Code).
- Reverse Engineering: Analyzing binary files, decompiling Python bytecode, and extracting hidden flags from obfuscated code and data.
 
Security Achievements
Screenshots and highlights from my cybersecurity journey
 
                                
                             
                                
                             
                                
                             
                                
                            Resume
View my complete professional background and experience.
Get in Touch
Have a question or want to discuss a project? Feel free to send me a message!