Offensive security researcher building open-source tools for pentesting, privacy, and vulnerability research, with CVE intelligence and automation at the core.
I build offensive security tools that scale human expertise through automated discovery and live threat intelligence. My tools continuously sync with CVE databases (NIST NVD, CISA KEV) to adapt attack patterns as vulnerabilities emerge. I leverage AI-assisted development through Claude and Cursor to rapidly prototype sophisticated tools, then refine them through real-world testing—creating systems that analyze thousands of targets while maintaining the nuance of manual analysis.
Stiletto automates the discovery and exploitation of SQL injection vulnerabilities using CVE-informed payloads and intelligent WAF bypass techniques. It adapts attack patterns based on server responses and defensive measures.
REST and GraphQL API security scanner. Automated testing with CVE-sourced payloads and OWASP API Top 10 coverage. SSRF, BOLA/IDOR, JWT, rate limiting, and secret scanning with SARIF output.
Network credential scanner with vulnerability correlation. Identifies default and weak credentials across common protocols while cross-referencing discovered services with NIST NVD and CISA KEV databases.
Asynchronous port enumeration tool. High-performance network scanner with service fingerprinting and CVE correlation for rapid attack surface discovery and vulnerability mapping.
Repository security scanner for modern threats. Detects exposed configuration files, AI model poisoning vectors, LLM infrastructure vulnerabilities, and Unicode-based obfuscation attacks in source code.
Client-side secret detection tool. Identifies exposed API keys, authentication tokens, and credentials in browser storage, cookies, IndexedDB, and WebSocket traffic using 157 signature patterns.
HTTP security header analysis tool. Evaluates server configurations for missing or misconfigured security headers, correlates findings with CVE databases, and generates SARIF-formatted reports.
Subdomain takeover detection system. Identifies dangling DNS records vulnerable to hijacking across major cloud providers using behavioral fingerprinting and multi-protocol verification techniques.
JWT vulnerability assessment framework. Tests JSON Web Tokens for common implementation flaws, weak signing algorithms, and CVE-specific vulnerabilities using automated analysis and brute-force techniques.
OSINT and dark web intelligence platform. Aggregates threat data from hidden services, cryptocurrency transactions, and public sources using graph database analysis for threat actor attribution.
Behavioral biometrics protection system. Monitors typing patterns, mouse movements, and touch interactions to detect anomalous behavior and prevent unauthorized access through pattern analysis.