With over 16 Hall of Fame entries and 60+ valid bugs discovered, I thrive in the world of ethical hacking and vulnerability research. I am passionate about cybersecurity and constantly expanding my skills as a Bug Bounty Hunter, where I help organizations identify and resolve critical vulnerabilities.
Currently, I am in my third year at the Faculty of Science, majoring in Computer Science and Statistics.
In parallel to my studies, I am developing my skills to become a Security Operations Center (SOC) Analyst, gaining hands-on experience with threat detection, monitoring, and incident response. Driven by curiosity and a commitment to securing the digital world, I am always eager to learn new techniques, tools, and technologies.
Security Analyst • Bug Bounty Hunter
Pinned Loading
-
Vulnerability-Notes
Vulnerability-Notes PublicBelow are all the notes and references for each vulnerability studied in the explanation
PHP 4
-
TV-Channel-Management-Database
TV-Channel-Management-Database PublicA database for Managing a TV channel with all its branches and departments -Identify basic requirements and entities . -Create of EER Design to Define the relations in the database. -Mapping EER to…
-
Cyber-Security-Fundamental
Cyber-Security-Fundamental PublicNotes on the basics learned in the field of cybersecurity and summaries of eJPT | N+ | eCIR | Sec+ | Linux Fundamental
Python 2
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.