Security researcher focused on vulnerability discovery across web applications, APIs, IoT firmware, and embedded systems.

This blog publishes post-fix technical write-ups of vulnerabilities found through legitimate bug bounty programs and coordinated vulnerability disclosure. All findings are published only after patches have been deployed.

Responsible Disclosure#

All vulnerabilities documented here were reported through official channels and fixed before publication. If you believe any content should be taken down, please reach out.

Contact#