ABOUT ME

Bug Bounty Hunter/Freelancer

2022 - present

I’m an Ethical Hacker dedicated to securing digital systems by identifying vulnerabilities and strengthening defenses. My expertise spans penetration testing, Web3 security, and IT support, helping businesses stay ahead of evolving threats.

With hands-on experience in offensive security and bug bounty research, I work to protect web applications, smart contracts, APIs, and networks. Every challenge sharpens my skills and fuels my mission to build a safer digital world.

📌 Need cybersecurity services?

On Upwork? Hire me directly here: Hire me!
Need a custom engagement? Contact me below for a personalized consultation.

two women facing security camera above mounted on structure
two women facing security camera above mounted on structure

PORTFOLIO/BLOGS

In the ever-evolving landscape of cybersecurity, password profiling stands as a crucial pillar in the defense against cyber threats. This blog explores the intricate world of password profiling, delving into the strategies, techniques, and tools used by ethical hackers to uncover vulnerabilities and fortify digital defenses. Join us as we unravel the complexities of password profiling and empower ourselves with the knowledge to safeguard against potential cyber attacks.

command computer keyboard key
command computer keyboard key

50 Essential Kali Linux Commands: From Beginner to Expert

black laptop computer with white paper
black laptop computer with white paper

Welcome to the first day of our 10-day cybersecurity challenge! Over the next ten days, we’ll dive into the exciting world of cybersecurity and ethical hacking. Today, we’ll cover the basics of cybersecurity, ethical hacking, and bug bounty hunting. Let's get started!

man operating laptop on top of table
man operating laptop on top of table