SubCat
Lightning-fast passive subdomain discovery with modular sources. Designed for pentesters and bug bounty hunters who need thorough recon without touching the target.
A guy who loves breaking things, finding vulnerabilities, and turning faint signals into full compromise paths.
Offensive security specialist with deep experience in penetration testing, vulnerability research, and building tools that the community relies on.
Years of hands-on security testing across web applications, cloud infrastructure, and Windows environments. Recognized by Synack as an Acropolis inductee for consistent, high-impact contributions to the Red Team program.
From subdomain enumeration to privilege escalation, I focus on building reliable attack paths and packaging that knowledge into tools others can use.
Security tools built from real-world needs and shared with the community.
Lightning-fast passive subdomain discovery with modular sources. Designed for pentesters and bug bounty hunters who need thorough recon without touching the target.
Windows privilege escalation research tooling. Experiments and techniques for post-exploitation scenarios in enterprise environments.
Minimalist Windows reverse shell for demonstrations and controlled lab environments. Clean, small, and purpose-built.
Technical write-ups and community recognition.
Interested in collaboration, research, or just want to talk security?