$ about

I operate on the offensive side of the fence. My expertise lies in web application security and adversarial simulation essentially, I think like the threat so you don't have to.

As the President of a Free Software and Open Source community at my university, I’m a firm believer in the "open" philosophy and a die-hard Linux user. Whether it’s hardening systems or managing servers, I prefer a terminal-first approach. Currently, I’m a member of Delta -an advanced R&D team within Siber Vatan- where we push the boundaries of security research and technical development.

For me, security isn't just a job; it's a lifestyle. You’ll often find me exploiting web applications, hunting flags in CTFs, experimenting with lockpicking, or out in the field doing warwalking with a Raspberry Pi. I’ve developed a workflow that prioritizes efficiency and operational realism, with a heavy focus on Active Directory environments and bypassing modern controls.

I have a zero-tolerance policy for outdated methodologies. In this game, it’s not about feeling safe; it’s about being technically superior to the adversary.

// Background

  • Security Researcher at Siber Vatan, Team Delta
  • President of Ondokuz Mayis University's Free Software and Open Source Community
  • Former CTI Analyst Intern at DNG-Tech
  • Former Cybersecurity & System Administration Intern at Ondokuz Mayis University

// Technologies & Tools

linux burp-suite metasploit nmap bloodhound bash havoc-framework gophish python powershell c/c++ golang raspberry pi windows active-directory docker proxmox

// Research Interests

  • Web Application Security: Complex vulnerability chains and business logic exploitation, OWASP Top 10.
  • Adversarial Simulation: AD attack paths, post-exploitation, and defensive bypasses.
  • Cyber Threat Intelligence: Developing custom OSINT frameworks and recon engines in Go.
  • Linux System Administration: Managing and securing Linux-based systems infrastructure.
  • Custom Tooling: Red team tooling and automation.

Technical Blog

I maintain a separate blog where I share detailed write-ups of my security research, tool development tutorials, and exploitation techniques.

visit blog