This newsletter is for pentesters, bug bounty hunters, and anyone preparing for certs like the OSCP who want real techniques that stick.
No endless payloads. Just practical tactics you’ll actually use when auditing real systems.
Each week, get actionable insights from my offensive security work—across Web2/Web3, mobile hacking, and Active Directory audits.
No spam. No noise. Just high-signal knowledge.
Mobile apps that unlock doors might seem secure — until you replay a BLE packet, go offline, or bypass the logic entirely.
Techniques to bypass root, Frida, and SSL protections in modern Android apps
How classic backend bugs like race conditions and IDORs still break Web3 withdrawal flows today
iOS Keychain 101: What It Is and How to Hack It
Breaking and Defending Android’s Key Vault
Usernames, sessions and hidden privilege paths: uncovering the domain’s true structure
How biometric checks fool developers and how you can fool them back.
JWTs: Small Tokens, Big Mistakes
Learn how exposed .git folders, sloppy commits, and forgotten tokens can turn a dev's mistake into your recon goldmine.
A practical guide to finding and exploiting SSRF vulnerabilities in modern applications.
Real-world techniques and tools for reversing Flutter apps, bypassing TLS pinning, and understanding how Dart code gets shipped in production.
A hands-on guide to the most effective Kerberos attacks in Active Directory environments
First Newsletter!