Reported critical vulnerability in Acme Corp's web application
Published AuthScanner v1.0 - Automated authentication testing tool
Wrote about bypassing modern WAF protections
Discovered a server-side request forgery vulnerability that allowed access to AWS metadata service, potentially exposing IAM credentials.
Identified improper JWT implementation allowing token tampering and privilege escalation.
Automated tool to test authentication mechanisms for common vulnerabilities.
View on GitHubTool to audit AWS, GCP, and Azure configurations for security misconfigurations.
View on GitHubPython script to enumerate subdomains using multiple techniques and data sources.
View on GitHubBash script to automate initial vulnerability scanning for web applications.
View on GitHubAn in-depth look at techniques to bypass web application firewalls using obfuscation, encoding, and protocol-level tricks.
Practical guide to identifying and exploiting common JWT implementation flaws with real-world examples.
Proof of concept demonstrating how to escalate SSRF vulnerabilities to cloud metadata service access.
Comprehensive methodology for testing REST and GraphQL APIs for security vulnerabilities.
Essential secure coding practices every developer should implement to prevent common vulnerabilities.
Exploring advanced SQL injection techniques including blind, time-based, and out-of-band SQLi.
Detailed writeup on identifying and exploiting IDOR vulnerabilities with mitigation strategies.
Read DocumentationComprehensive guide to SSRF attacks, detection methods, and exploitation techniques.
Read DocumentationTechnical documentation on XXE vulnerabilities, attack vectors, and prevention.
Read DocumentationComplete guide to using Burp Suite for web application security testing.
Read DocumentationAdvanced Nmap techniques for network reconnaissance and vulnerability scanning.
Read DocumentationPractical guide to using Metasploit for penetration testing and vulnerability validation.
Read DocumentationWindows and Linux privilege escalation techniques with practical examples.
Read DocumentationTechniques for moving laterally through networks during penetration tests.
Read Documentation