About
Security researcher focused on vulnerability discovery across web applications, APIs, IoT firmware, and embedded systems.
This blog publishes post-fix technical write-ups of vulnerabilities found through legitimate bug bounty programs and coordinated vulnerability disclosure. All findings are published only after patches have been deployed.
Responsible Disclosure#
All vulnerabilities documented here were reported through official channels and fixed before publication. If you believe any content should be taken down, please reach out.