About
Cybersecurity enthusiast with a strong interest in ethical hacking, penetration testing, vulnerability analysis, and network security, Hard-working, energetic, personable, and technical-minded individual. I also possess:
- Experience in Programming Languages including Python, Bash, Golang, PHP
- Task Management. Ability to handle multiple projects simultaneously.
Projects
ChatGenius is a software company that provides a powerful AI chatbot solution powered by GPT-4 and ChatGPT. Our chatbot offers 24/7 support in over 110 languages and can be integrated seamlessly into your website or platform.
• CantHide finds previous locations by looking at a given social media account. Currently, we have over 100 users.
canthide.me/ (Closed for now)
Side Projects
• Detect real scammers with Wallet-Tracker CLI from anywhere.
• ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
Program scans your face and if it is not matched with the owner, it calls the owner.
Wifi Password Stealer. Get All Registered Wifi Passwords fromTarget Computer.
• Get Keyboard, Mouse, ScreenShot, and Microphone Inputs from Target Computer and Send to your Mail.
Speaking
Writing
Awards
- SQL Injection
- Stored XSS
- Multiple OTP Bypass
- Multiple Business Logic Bugs (Price Manipulation etc.)
- Multiple Information Disclosure
•NETGEAR
•SOPHOS
•BITDEFENDER
•DELL TECHNOLOGY
•TELEFONICA GERMANY
•TRIPADVISOR
•CISCO MERAKI
and other +25 companies
Founding Overpermissioned API Key
Stored XSS on Logitech
- Application Level DOS Attack
- Information Disclosure
Founding MySQL credentials
Reflected XSS
Work Experience
- Developed and implemented software applications using programming languages such as Golang.
- Collaborated with cross-functional teams to design and develop complex software solutions that met business requirements.
- Implemented and maintained software testing methodologies and tools to ensure high-quality software delivery.
- Conducted code reviews and provided feedback to team members to ensure code quality and consistency.
- Designed and developed RESTful APIs using frameworks such as Echo, and Gin.
- Worked with databases such as MySQL, PostgreSQL, or MongoDB to store and retrieve data efficiently.
- Utilized Agile development methodologies to plan and execute software projects.
- Created and maintained technical documentation including architecture diagrams, design documents, and user manuals.
- Utilized DevOps tools such as Git, Jenkins, or Docker to streamline the software development lifecycle.
- Worked with cloud platforms such as AWS, Azure, or GCP to deploy and scale software applications.
- Perform simulated cyberattacks on a company’s computer systems and networks
- Perform tests on applications, network devices, and cloud infrastructures
- Research and experiment with different types of attacks
- Write technical and executive reports
- Utilize platforms and tools such as Kali Linux, Metasploit Framework, Burp Suite, MobSF and Mobile Penetration Testing.
- In the STMCTF, Turkey's longest-running Capture The Flag competition organized by STM, my team OutLawz came in 6th place in YTU Davutpaşa Campus in the final of 200 competitors and 50 teams and I was the Hacker with the highest score in team.
- Perform simulated cyberattacks on a company’s computer systems and networks
- Perform tests on applications, network devices, and cloud infrastructures
- Research and experiment with different types of attacks
- Write technical and executive reports
- Forensics (Memory, Artifacts etc.)
- Create Network Architecture Simulation on Traceroute
- Perform simulated cyberattacks on a company’s computer systems and networks
- Perform tests on applications, network devices, and cloud infrastructures
- Research and experiment with different types of attacks
- Write technical and executive reports
- CTF challenges
- Understand application security methodologies and frameworks
- Working in a very team-oriented environment and interacting with engineers from other design disciplines
- Working with other scrum teams for security-focused design
- Communicate technical vulnerabilities and remediation steps to developers and management
- Develop security standards, policies, and automation scripts
- Perform web application, mobile application, and network penetration tests
- Research and experiment with different types of attacks
- Write technical and executive reports
- Writing rules on the detection of possible anomalies in requests in Web applications.
- I found Critical Security Bugs on Penetration Tests that impacts a hundred of thousand people.
-
Knowledge in architecture and development for real-time software systems and development of appealing UI driven mobile applications
-
Created Rocket Dashboard for getting simultaneous information about Rocket like velocity, altitude, pressure, etc. and show on graph. (TeknoFest - Space and Technology Festival is an aviation, technology, and space technology festival held in Turkey.)
-
Designed and implemented software that integrates products with third-party applications or products
-
We passed the Pre-Elimination on TeknoFest Competition over 150 teams.
Education
Computer Engineering, 3.46 GPA, Full Scholarship