Fev

Available for Work

Open to red team engagements, security engineering roles, and vulnerability research contracts.

Offensive security researcher building open-source tools for pentesting, privacy, and vulnerability research. My tools scale human expertise through automated discovery and live threat intelligence — continuously syncing with NIST NVD and CISA KEV to adapt as vulnerabilities emerge, while analyzing thousands of targets with the nuance of manual analysis.

11 Tools
500+ CVE Patterns
Approach

Every tool in this portfolio solves the same problem: scaling human expertise. Whether it's reconnaissance, exploitation, or attribution, the pattern is consistent — automate the tedious, preserve the nuance, correlate against live vulnerability data. Tools are grouped below by phase: attack surface discovery, targeted exploitation, passive detection, and threat attribution.

Recent Highlights
Integrated live CVE correlation across all scanning tools, reducing false positive rates by 40%
Developed async scanning architecture achieving 10,000+ ports/minute with service fingerprinting
Built ML-powered payload generation system adapting to WAF responses in real-time
Certifications
ISC² CC: Certified in Cybersecurity
Development
Python, TypeScript, Async Architecture
Core Competencies
Penetration Testing & Red Team Operations
Web Application Security Assessment
API Security Testing (REST, GraphQL)
Network Vulnerability Analysis
CVE Research & Exploitation Development
Privacy & Client-Side Security
Security Tool Development (Py, Ts)
OSINT & Threat Intelligence Gathering

Offensive Recon

Automated attack surface discovery — map targets fast, find weaknesses before adversaries do.

Dockyard 001

High-performance async port scanner with 500+ CVE signatures, service fingerprinting, passive recon (Shodan InternetDB), host discovery, CDN/WAF auto-skip, UDP scanning, QUIC v1/v2 detection, Nmap piping, script hooks, and LLM scan summaries with prompt-injection hardening.

1000+ ports/second with 6 timing profiles, scope authorization, and audit logging. Reports in HTML, Nmap XML, Nuclei JSON, and machine-readable list formats.

python async cve reconnaissance
Python
Argus 002

Intelligence-driven default credential scanner across 8 protocols (SSH, HTTP, FTP, Telnet, Redis, MongoDB, MySQL, SNMP) with real-time CVE enrichment via NIST NVD and CISA KEV. Async scanning, FastAPI REST API, SIEM export, and multi-channel notifications.

Finds default creds on vulnerable services and delivers both the access and the CVE — instant context for prioritization. 3-5x faster with async mode.

python async cve cve
Python
Specter 003

Production-grade subdomain takeover detection with 40+ cloud provider fingerprints, active enumeration (CT logs, Web Archives, DNS brute), DNS-over-HTTPS, second-order CNAME chain analysis, NS delegation takeover, expired domain detection via RDAP, and behavioral anomaly engine.

Hunts phantom subdomains before attackers claim them. Four detection layers: discovery, verification, analysis, and cutting-edge DNS security.

python dns doh enumeration
Python

Exploitation

Targeted vulnerability exploitation — CVE-informed, adaptive, and WAF-aware.

ClaimJumper 004

Professional JWT security testing toolkit. 15+ vulnerability checks, 100K secret wordlist (~19K/s cracking), and CVE-specific attacks: algorithm confusion (CVE-2022-39227), kid injection, JKU/X5U injection, null signature bypass, psychic signature, and JWKS spoofing.

Analyzes, cracks, forges, and exploits JWTs — from weak secrets to CVE-specific attack chains — in a single automated audit.

python jwt cve authentication
Python

Detection

Passive security scanning — identify misconfigurations, exposed secrets, and emerging threats without triggering alerts.

GitExpose 005

Advanced security scanner for the 2025+ threat landscape. 100+ patterns detect exposed files, React2Shell (CVE-2025-55182), ML model poisoning (pickle opcode analysis), LLM infrastructure exposure, invisible Unicode attacks (GlassWorm), cloud assets, and CI/CD configs. Includes MCP server for AI agent integration.

Catches modern threats that traditional SAST misses — from AI model poisoning to Unicode Trojan Source — with 95%+ false positive reduction.

python ai-ml mcp analysis
Python
Prizm 006

Browser extension scanning 7+ storage types, WebSocket traffic, Service Worker caches, and GraphQL endpoints for exposed secrets. 157 patterns, ML-powered classification, live verification against 9 provider APIs, and asset-based risk scoring. Zero dependencies, Manifest V3.

Scans the attack surface most tools ignore — live websites, WebSocket traffic, and Service Worker caches — with ML classification and live secret verification.

javascript extension ml analysis
JavaScript
Corsair 007

HTTP security header scanner with 60+ header checks, 1,200+ fingerprinting signatures, CVE correlation with CISA KEV, compliance mapping (OWASP 2025, PCI-DSS 4.0, SOC 2), historical drift detection, and AI-powered remediation via MCP server.

Grades security posture A-F, maps misconfigs to CVEs, and tracks drift over time — with SARIF output for GitHub Code Scanning.

python headers compliance audit
Python
Restless 008

Automated security testing for REST and GraphQL APIs. Full OWASP API Security Top 10 (2023) coverage: SSRF, BOLA/IDOR, auth bypass, GraphQL abuse, rate limit bypass, and secret scanning. CVE-sourced payloads, SARIF output, web dashboard, and Docker support.

Covers the full OWASP API Top 10 in a single async pass — SSRF, BOLA, JWT, GraphQL, rate limits — with SARIF for CI/CD integration.

python owasp graphql owasp
Python

Defensive / Privacy

Browser-native behavioral security — protect users without compromising their data.

Kala 009

Anti-behavioral fingerprinting browser extension. 22 protection modules defend against keystroke dynamics, mouse/scroll/touch tracking, device motion fingerprinting, and timing attacks. Adaptive delay injection with log-normal distribution, ML evasion patterns, and stealth mode. React 18 + TypeScript on Manifest V3. Zero data transmitted.

Defeats behavioral biometrics tracking that identifies you even in private browsing — 22 modules, three privacy levels, under 2ms overhead.

typescript react privacy typescript
TypeScript