$ about
I operate on the offensive side of the fence. My expertise lies in web application security and adversarial simulation essentially, I think like the threat so you don't have to.
As the President of a Free Software and Open Source community at my university, I’m a firm believer in the "open" philosophy and a die-hard Linux user. Whether it’s hardening systems or managing servers, I prefer a terminal-first approach. Currently, I’m a member of Delta -an advanced R&D team within Siber Vatan- where we push the boundaries of security research and technical development.
For me, security isn't just a job; it's a lifestyle. You’ll often find me exploiting web applications, hunting flags in CTFs, experimenting with lockpicking, or out in the field doing warwalking with a Raspberry Pi. I’ve developed a workflow that prioritizes efficiency and operational realism, with a heavy focus on Active Directory environments and bypassing modern controls.
I have a zero-tolerance policy for outdated methodologies. In this game, it’s not about feeling safe; it’s about being technically superior to the adversary.
// Background
- ▹ Security Researcher at Siber Vatan, Team Delta
- ▹ President of Ondokuz Mayis University's Free Software and Open Source Community
- ▹ Former CTI Analyst Intern at DNG-Tech
- ▹ Former Cybersecurity & System Administration Intern at Ondokuz Mayis University
// Technologies & Tools
// Research Interests
- ▹ Web Application Security: Complex vulnerability chains and business logic exploitation, OWASP Top 10.
- ▹ Adversarial Simulation: AD attack paths, post-exploitation, and defensive bypasses.
- ▹ Cyber Threat Intelligence: Developing custom OSINT frameworks and recon engines in Go.
- ▹ Linux System Administration: Managing and securing Linux-based systems infrastructure.
- ▹ Custom Tooling: Red team tooling and automation.
Technical Blog
I maintain a separate blog where I share detailed write-ups of my security research, tool development tutorials, and exploitation techniques.
visit blog