I find vulnerabilities before the bad guys do. Specialising in deep target enumeration, manual-first methodology, and responsible disclosure — with acknowledged reports across multiple platforms and programmes.
Reported to Airbnb, Dyson, Inditex, Freshworks, Magic Eden and 1,200+ other targets.
Deep, in-depth reconnaissance — subdomain discovery, port scanning, technology fingerprinting, attack surface mapping, and asset correlation before touching a single endpoint.
Comprehensive manual testing covering OWASP Top 10 and beyond — XSS, SQLi, IDOR, SSRF, XXE, auth bypass, business logic flaws, and more.
Strategic use of industry-standard tools to support manual findings. Tools amplify, they don't replace — used for efficiency, not as a crutch.
Clear, professional vulnerability reports with full PoC, impact analysis, and remediation steps. Responsible disclosure to every affected organisation.
// Testing Methodology Split
Started learning web application security from scratch. Began with OWASP Top 10, basic HTTP concepts, and setting up Burp Suite. First steps into the hacker mindset.
Practiced on PortSwigger Web Security Academy labs — XSS, SQLi, CSRF, SSRF, XXE. Built hands-on skills through structured challenges before moving to real targets.
Reported first real security vulnerability to a live target through responsible disclosure. The company acknowledged the issue — a milestone moment that confirmed this was the right path.
Security issue reported and personally acknowledged by Mathias Ahlgren. Validated the quality and professionalism of the disclosure process and reporting skills.
Reported critical security issue to Tomorrow Web Design. Founder Tansu Cabaci personally responded, confirming steps were taken to remediate the vulnerability.
Completed EC-Council's Practical Bug Bounty Hunting for Hackers and Pentesters — formalising expertise in bug bounty methodology, tools, and professional reporting standards.
Active bug bounty hunter on HackerOne and Bugcrowd. Continuously expanding scope, refining methodology, and hunting across public and private programmes worldwide.
Target: Airbnb — Exploited an open redirect to reach internal metadata services, potentially exposing cloud credentials.
Target: Inditex (Pull & Bear) — Manipulated server response on the client-side to spoof successful payment confirmation.
Target: Dyson — Identified a vulnerability allowing for complete session takeover by replacing authentication cookies.
Target: Freshworks — Insecure Direct Object Reference allowed editing and returning sensitive data of other agent profiles.
Target: Magic Eden — Successfully identified and claimed a subdomain vulnerable to takeover via misconfigured OneSignal settings.
Target: Arkose Labs — Information disclosure vulnerability exposing WordPress administrative details and user lists.
"Just realised I totally forgot to implement it on these domains. Thank you for the heads up. Really nice and appreciated of you."
"Thanks, I appreciate the heads up!"
"Thank you for pointing out the security issue on our website. We appreciate your input and are taking steps to correct the problem."
Need a penetration test, security audit, or bug bounty collaboration? I bring thoroughness, professionalism, and a hacker's eye to every engagement.
Send a Message