WEB APP
OWASP Top 10, Auth Bypass, SQLi, XSS, Logic Flaws
Freelance pentester and École 42 alumni, specializing in vulnerability research and low-level exploitation. With strong expertise in C and Assembly, I dissect systems to understand their core flaws.
OWASP Top 10, Auth Bypass, SQLi, XSS, Logic Flaws
Pentest, Pivoting, AD Exploitation, MiTM
REST/GraphQL, BOLA, Mass Assignment, Rate Limiting
AWS, Azure, IAM Misconfigs, S3 Exposure, K8s
C, Low-level Programming, Kernel Drivers, Memory Management
Reverse Engineering, Obfuscation, Anti-AV, Analysis
Python, Automation, Custom Tooling, Exploitation Frameworks
CTF Creation, Training, Security Workshops, Mentorship

I am a freelance pentester passionate about offensive security and reverse engineering. Trained at École 42, I forged my technical skills through intensive hands-on practice and peer-to-peer learning.
My approach to cybersecurity is rooted in knowledge sharing: I firmly believe that collaborating and documenting our findings is how we grow together. That is the very purpose of this portfolio and my write-ups. In the field, I focus heavily on low-level languages like C and Assembly.
Don't wait for a breach to happen. Let's find the holes in your security before the threat actors do.