██████╗ ███████╗██╗ ██╗██████╗ ██╗ ██████╗ ██████╗██╗ ██╗ ██████╗ ███████╗██╗ ██╗
██╔══██╗██╔════╝██║ ██║██╔══██╗██║ ██╔═══██╗██╔════╝██║ ██╔╝ ██╔══██╗██╔════╝██║ ██║
██████╔╝█████╗ ██║ ██║██████╔╝██║ ██║ ██║██║ █████╔╝ ██║ ██║█████╗ ██║ ██║
██╔══██╗██╔══╝ ╚██╗ ██╔╝██╔══██╗██║ ██║ ██║██║ ██╔═██╗ ██║ ██║██╔══╝ ╚██╗ ██╔╝
██║ ██║███████╗ ╚████╔╝ ██████╔╝███████╗╚██████╔╝╚██████╗██║ ██╗██╗██████╔╝███████╗ ╚████╔╝
╚═╝ ╚═╝╚══════╝ ╚═══╝ ╚═════╝ ╚══════╝ ╚═════╝ ╚═════╝╚═╝ ╚═╝╚═╝╚═════╝ ╚══════╝ ╚═══╝
Security researcher, bug bounty hunter, and occasional speaker.
I break things for a living—ethically. Here you'll find vulnerability disclosures, security research, and conference talks.
$ recent