Web application security researcher
Live linkebility exploitation
System hardening
Network security
Bug bounty hunting
Identity security researcher
done with modules of CEH
Done with CTF
Completed OWASP top 10 _2017
birth of 2017
here for a wide place to learn and earn
ID is _ [login to view URL]
# yet to do _ iot _ clouds _ forensics _ reverse