SubCat
Lightning-fast, passive subdomain discovery with modular sources and low target impact.
Offensive security specialist with years of hands-on testing, research and CTFs. Author of SubCat, a lightning-fast passive subdomain discovery tool used by pentesters and bug bounty hunters. I enjoy turning faint frontend clues into real backend compromise paths — and then writing up what we can learn from them.
Lightning-fast, passive subdomain discovery with modular sources and low target impact.
Windows privilege-escalation research tooling and experiments.
Tiny Windows reverse shell — minimalist design for demos and labs.
Synack “Exploits Explained”: how unsafe routing/eval() led to RCE, and how to prevent it.
Read on SynackCommunity posts and shout-outs about SubCat releases and usage.
Recognized by Synack for contributions to security research and testing.
View profile
• GitHub DMs: @duty1g
• X / Twitter: @duty_1g
• (Optional) Add email or form link here.