_

[CYBERSECURITY]

Analyzing real-world vulnerabilities

Exposing attack patterns and zero-days

Documenting the art of ethical hacking

200+
Reports
Analyzed
5
Bug
Classes
3
Platforms
4+
Years
Research

[ACTIVE_RESEARCH]

IDOR Analysis

Medium to Critical

Comprehensive analysis of 200+ IDOR vulnerabilities

Published

Severity: Medium to Critical

Analysis: Pattern recognition

Server-Side Request Forgery

Medium to Critical

Comprehensive analysis of 200+ SSRF vulnerabilities

Published

Severity: Medium to Critical

Analysis: Pattern recognition

HTTP Request Smuggling

Medium to Critical

Exploring HTTP Request Smuggling vulnerabilities

Research

Severity: Medium to Critical

Analysis: Pattern recognition