Finding critical vulnerabilities in enterprise systems. Specializing in web security, authentication bypasses, and business logic flaws across major platforms.
Chained unverified email registration with OTP race condition to hijack any user account, completely bypassing 2FA verification through logical flaw exploitation.
Discovered and exploited message editing functionality to bypass conversation limits for free accounts, demonstrating fundamental business logic flaw in AI platform.
Stored XSS in user profile fields (name, address) leading to cookie theft and full account compromise on major sports social media platform.
Custom dork discovery leading to exposure of 25+ API keys, Facebook App IDs, and production credentials through misconfigured cloud storage.
Google Dorks generator with 150+ curated dorks for finding APIs, cloud exposures, directory listings, admin panels, and sensitive files for bug bounty research.
Command-line image forensics toolkit for metadata extraction, steganography detection, image hashing, and password protection detection.
Cybersecurity awareness web toolkit featuring email breach checks, hash generators, link analyzers, and phishing awareness tools for educational purposes.
Collection of notes and Python scripts for web vulnerabilities including SQLi, XSS, CSRF, and DOM-based attacks based on PortSwigger learning.