ABOUT ME

Bug Bounty Hunter/Freelancer

2022 - present

Welcome to my corner of the cybersecurity world! I'm deeply passionate about safeguarding digital landscapes, and my journey as a dedicated pentester and bug bounty hunter reflects this fervor. Through conquering exploits and uncovering vulnerabilities, my portfolio stands as a testament to my unwavering commitment to cybersecurity excellence. Together, let's explore the dynamic realm of cybersecurity, where each challenge fuels my expertise and shapes our collective digital future. Join me on this exhilarating journey as we work towards a safer online world, one exploit at a time.

two women facing security camera above mounted on structure
two women facing security camera above mounted on structure

PORTFOLIO/BLOGS

In the ever-evolving landscape of cybersecurity, password profiling stands as a crucial pillar in the defense against cyber threats. This blog explores the intricate world of password profiling, delving into the strategies, techniques, and tools used by ethical hackers to uncover vulnerabilities and fortify digital defenses. Join us as we unravel the complexities of password profiling and empower ourselves with the knowledge to safeguard against potential cyber attacks.

command computer keyboard key
command computer keyboard key

50 Essential Kali Linux Commands: From Beginner to Expert

black laptop computer with white paper
black laptop computer with white paper

Welcome to the first day of our 10-day cybersecurity challenge! Over the next ten days, we’ll dive into the exciting world of cybersecurity and ethical hacking. Today, we’ll cover the basics of cybersecurity, ethical hacking, and bug bounty hunting. Let's get started!

man operating laptop on top of table
man operating laptop on top of table