Duty

Security Researcher & Red Teamer

A guy who loves breaking things, finding vulnerabilities, and turning faint signals into full compromise paths.


Who I Am

Offensive security specialist with deep experience in penetration testing, vulnerability research, and building tools that the community relies on.

Background

Years of hands-on security testing across web applications, cloud infrastructure, and Windows environments. Recognized by Synack as an Acropolis inductee for consistent, high-impact contributions to the Red Team program.

Synack Red TeamAcropolis Inductee
Bug BountyActive Hunter

Expertise

From subdomain enumeration to privilege escalation, I focus on building reliable attack paths and packaging that knowledge into tools others can use.

Web Security Cloud Windows Recon Python Go C# PureBasic

Open Source Tools

Security tools built from real-world needs and shared with the community.

🔍

SubCat

Lightning-fast passive subdomain discovery with modular sources. Designed for pentesters and bug bounty hunters who need thorough recon without touching the target.

Python Recon
View

PwnTato

Windows privilege escalation research tooling. Experiments and techniques for post-exploitation scenarios in enterprise environments.

PureBasic Windows
View
>>

dty

Minimalist Windows reverse shell for demonstrations and controlled lab environments. Clean, small, and purpose-built.

PureBasic PoC
View

Publications & Features

Technical write-ups and community recognition.


Let's Connect

Interested in collaboration, research, or just want to talk security?