Blogs

Insights on managed bug bounty, offensive security operations and building programs that actually find critical vulnerabilities.
CPaaS Webhook Security
Managed bug bounty playbook for CPaaS webhook and API security. Outbound fetcher SSRF, HMAC replay, inbound DLR and MO abuse, cross-tenant routing, secret leakage, idempotency bugs, PII in callbacks.
Broken Authentication
Broken Authentication manual testing guide
JS Obfuscation
Why it exists, how it works, and how to tear it apart — string encoding, control flow flattening, eval packing, and a 15-minute triage workflow.