About Me
I'm a security analyst specializing in web and mobile application vulnerability assessments. My day-to-day involves identifying flaws that others miss—within APIs, mobile apps, authentication logic, and front-end/backend boundaries.
Beyond my primary role, I've gained hands-on experience in IoT and cloud infrastructure security, especially in simulating attacker behavior across misconfigured devices and services.
While I currently focus on black-box and gray-box testing, I'm also building my capabilities in red teaming—particularly around adversary simulation and threat-informed methodology. I'm in the process of learning C2 frameworks to bridge the gap between isolated exploits and full-chain attack modeling.
Technical Focus
- Web & Mobile Penetration Testing
- Reverse Engineering (static/dynamic)
- Vulnerability Research in Real-World Architectures
- IoT & Cloud Exploitation Scenarios
Learning
- C2 Frameworks (Sliver)
- Red Team Workflow & Simulation Strategy
This blog is where I document practical notes, tools, techniques, and reflections—less as a portfolio, more as a record of learning through controlled failure and deliberate practice.
"Real security isn't what survives the scanner—it's what survives intent."
Let's connect: dynamic0920@gmail.com | GitHub