Title
Type
Independent security researcher and freelance penetration tester. I help product teams ship safer software through manual, source-aware testing across web, mobile, API, infrastructure, cloud, and AI surfaces.
A small, verifiable footprint. Public CVEs, coordinated disclosure, and a steady cadence of work for vendors and platforms.
I have spent the better part of ten years finding the bugs that ship past code review and scanners. From WordPress plugins to enterprise GraphQL gateways to mobile apps with eight figure user counts, my work has been shipped, patched, and publicly disclosed across hundreds of programs.
I work the way I would want a tester to work for my own product: manual first, source aware, with reports your engineers can act on without translation. No inflated severities, no vague paragraphs, no proprietary scanner outputs dressed up as findings. Reproducible PoCs, severity rationale you can defend in a triage meeting, and remediation guidance that ships.
Started on bug bounty platforms and weekend CTFs in 2016. Have not stopped since. Coordinated 18 plus CVEs through Wordfence Threat Intel and a steady cadence of disclosures across HackerOne, Bugcrowd, and vendor VDPs.
Joined a product security team. Drove threat models, led red team engagements, and built internal tooling for surface enumeration and bundled JavaScript forensics, all while continuing the bug bounty cadence on the side.
Promoted into the senior track. Now also taking selected freelance engagements for product teams that want manual depth instead of checkbox audits.
A rotating sample of CVEs I have authored. The full list is on Wordfence Threat Intel.
Type
Manual-first, tooling-assisted, source-aware. Picked because each one has shipped real findings to vendors and platforms.
Authentication and session flaws, IDOR, SSRF, XSS chains, CSRF, CORS abuse, race conditions, business logic. OWASP ASVS aligned.
SDL recon, introspection abuse, depth and complexity DoS, auth-layer drift across environments, unsafe mutations, BOLA and mass assignment.
Prompt injection (direct and indirect), tool and RAG abuse, agent jailbreaks, system-prompt exfiltration, data leakage. OWASP LLM Top 10.
Android and iOS. APK and IPA reversing, JADX, Frida hooks, native lib triage, deeplink and intent abuse, secrets and config exfiltration. MASVS aligned.
External and internal network testing, host hardening, segmentation review, exposed admin services, lateral movement and privilege escalation.
AWS, GCP, Azure. Open buckets, exposed metadata, IAM blast-radius, Kubernetes and Envoy admin leaks, CDN cache abuse, Firebase rules.
Secure code review across JavaScript, TypeScript, Python, Go, PHP. Bundled JS forensics, supply chain triage, prototype pollution, SAST validation.
Windows desktop and Electron applications. IPC abuse, DLL hijack, registry and filesystem hardening, traffic interception, binary patching.
Four steps, fixed deliverables, no surprises. NDA on request before scoping.
A 30 minute call to agree targets, depth, exclusions, timeline, and the shape of the deliverable.
Surface mapping and a prioritized attack plan. You sign off before active testing begins.
Daily updates, immediate notice on Critical findings, full audit trail of requests and tooling.
Executive summary, per-finding writeups with PoCs, severity rationale, and remediation guidance. One free retest after fixes.
Engagements are scoped against the testing methodology that fits your asset and timeline. Black box, grey box, or white box.
No internal info, no credentials, no source.
Credentials, partial docs, sometimes a staging URL.
Source, docs, architecture, and engineering access.
Same operator. Same severity rationale. Yield scales with the access you grant. Pricing on inquiry.
Tell me what the asset is and what worries you. You will get a scoped proposal and start date inside 24 hours.