██████╗ ██╗ ██╗██████╗ █████╗ ██████╗ █████╗ ███████╗███████╗ ██████╗ ██╔════╝ ██║ ██║██╔══██╗██╔══██╗██╔══██╗██╔══██╗██╔════╝██╔════╝██╔════╝ ██║ ███╗██║ ██║██████╔╝███████║██████╔╝███████║███████╗█████╗ ██║ ██║ ██║██║ ██║██╔══██╗██╔══██║██╔══██╗██╔══██║╚════██║██╔══╝ ██║ ╚██████╔╝╚██████╔╝██║ ██║██║ ██║██████╔╝██║ ██║███████║███████╗╚██████╗ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚═════╝ ╚═╝ ╚═╝╚══════╝╚══════╝ ╚═════╝
I am a cybersecurity researcher and Bug Bounty Hunter with deep expertise in:
- Web Application Security
- Penetration Testing
- Vulnerability Discovery
- Capture The Flag (CTF)
- Red Team Simulation
Core Specialties:
Reconnaissance · Web Exploitation · OWASP Top 10 · Subdomain Enumeration · Responsible Disclosure · CTFs