Cybersecurity is not just my field of study, it’s my passion — I keep learning, breaking, and building to stay ahead of threats.
Specialized in offensive and defensive security practices, penetration testing, and cyber risk management.
Focused on software development, programming fundamentals, and building scalable applications.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Identifying and exploiting vulnerabilities to strengthen system defenses.
Simulating advanced adversaries to test real-world resilience.
Breaking down software and binaries to uncover hidden logic and flaws.
Creating and dissecting malware to understand attacker techniques.
Gathering and analyzing data to anticipate cyber threats.
Rapidly detecting, containing, and eradicating security breaches.
Collecting and analyzing digital evidence to investigate cyber incidents.
Assessing and mitigating business and technical risks.
Analyzing source code to uncover logic flaws and hidden vulnerabilities.
Provides a complete manual penetration test of web applications to identify vulnerabilities (XSS, SQLi, SSRF, RCE, auth flaws) and deliver actionable remediation guidance.
Manual and automated testing of mobile applications to find insecure storage, broken crypto, improper intents, and other platform-specific flaws.
Full manual network assessment to discover weaknesses in network architecture, devices and services, plus prioritized fixes to harden the environment.
In-depth testing of REST/GraphQL APIs for auth/authorization issues, injection, rate-limit bypass, business logic flaws and insecure endpoints.
Assessments of cloud configurations (AWS/Azure/GCP), IAM, storage buckets, network rules and deployment pipelines to reduce misconfiguration risks.
Manual code review to detect insecure coding patterns, authentication/authorization bugs, and insecure third-party use — with remediation examples.
Investigating digital evidence to uncover traces of cyber incidents.
Evaluating systems to measure, manage, and minimize security risks.
Dissecting malicious software to understand, detect, and defend against threats.
Ensuring data protection and privacy in line with EU regulations.
Continuous monitoring and defense through a dedicated Security Operations Center.
Introduction Web vulnerabilities can pose significant risks to both website administrators and users. One such vulnerability, CVE-2023-29489, a cross-site scripting…
How I Discovered a Reflected XSS on the MOD UK Police Website (WAF Bypass) Assalamualaikum everyone, and welcome to my…
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.