I am a white-hat hacker and senior security consultant with a strong interest in both software development and application security engineering.

In 2014, I started participating in bug bounty programs and managed to rank up amongst HackerOne all-time top 20 hackers with over 750 security vulnerabilities responsibly disclosed to hundreds of high-profile organizations, the likes of Google, Yahoo, Twitter, Facebook, Uber, etc.

In 2016, I started writing technical content on various cybersecurity topics for Infosec Institute magazine.

In 2017, I joined HackerOne as a security analyst to help with bug bounty programs management and triage for different renowned organizations such as US Air Force, Yahoo, Adobe, Salesforce, etc. as well as closely coordinating with a large community of security researchers.

In 2018, our team won HackenCup live hacking competition organized by HackenProof in Kiev, Ukraine.

In 2020, I started undertaking contract work offering security consulting services (penetration testing, security assessment, code review, trainings, etc.) for companies from various industries. In the same regard, I joined HackerOne’s pentest program in 2022 and also became Bugcrowd’s certified penetration tester (CPT).

In 2022, I won 1st place and Most Valuable Hacker (MVH) title at HackerOne’s live hacking competition held in Denver, CO.

I’m a member of BSides Ahmedabad CFP review board and a keynote speaker at BSides Amman as well as speaker at various other international conferences such as BSides Belfast, OWASP Seasides in Goa, International cybersecurity conference in Kosovo, etc.

I hold two master’s degrees, one of which is in management of information systems from IÉSEG School of Management, and a 2nd in corporate finance from ISCAE business school.

Security Research

  • 2014-09-04, Sagem Fast 3304-V2, “Sagem Fast ADSL Router is vulnerable to an authentification bypass vulnerability which allows to modify the preconfigured root password.”

  • 2015-12-22, SeaMonkey browser, “Cross-site scripting (XSS) vulnerability due to unvalidated image src attribute pointing to a javascript: URL.”

  • CVE-2015-7580, Ruby On Rails, “Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x.”

  • CVE-2015-8474, Redmine, “Open redirect vulnerability in the valid_back_url function in app/controllers/application_controller.rb in Redmine before 2.6.7, 3.0.x before 3.0.5, and 3.1.x before 3.1.1”

  • CVE-2016-5832, Wordpress, “The customizer in WordPress before 4.5.3 allows remote attackers to bypass intended redirection restrictions via unspecified vectors.”

  • CVE-2020-26210, BookStack, “A user with permissions to edit a page could add an attached link which would execute untrusted JavaScript code when clicked by a viewer of the page.”

Projects & Contributions

  • Sublert: a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
  • ASNLookup: an API to quickly lookup updated information about specific ASN, Organization or registered IP addresses (IPv4 and IPv6) among other relevant data.
  • Cisco ASA: a script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.

Conferences & talks

Media & Interviews