Webdev & security researcher.
The math behind bug bounties — A formula to calculate bounty amounts.
This is a technical write-up and proposition on some research conducted by Tom Hudson and EdOverflow to develop a formula that calculates the bounty amount efficiently and transparently. This write-up also highlights the potential benefits of using this formula in the bug bounty industry.
Operation FGTNY 🗽 - Solving the H1-212 CTF.
Solving the "H1-212" CTF by HackerOne.
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby's native resolver.
I discovered a bug in Resolv::getaddresses that has direct security implications on any Ruby-based application or gem that relies on it for anything security related.
A lightweight reconnaissance setup for bug bounty hunters
The following is a lightweight reconnaissance setup that should help you quickly gather information on a given target. We will run through the basic installation steps and then take a look at how to use this setup while hunting.
Broken Link Hijacking - How expired links can be exploited.
This post aims to give you a basic overview of the different issues that could possibly arise if a target links to an expired endpoint.
On-platform GitHub Reconnaissance
My basic workflow when using GitHub for recon purposes.
Capture the flag: reversing the passwords (Solutions)
My solutions to the "reversing the passwords" CTF by Jobert.
GitHub for Bug Bounty Hunters
My tips for finding security issues in GitHub projects.
Bug Bounty FAQ
A list of questions that bug bounty hunters frequently DM me about. 😄