Independent security researcherOffensive firstReproducible findings

Ipyana

I find real vulnerabilities in applications and infrastructure, prove their impact, and document them clearly so they can be fixed.

Web & API testing

Authentication, authorization, and business logic flaws identified and validated with reproducible evidence.

Cloud & network

Misconfigurations and external exposure identified across cloud and network environments.

Reporting & retest

Clear write-ups with reproduction steps and remediation guidance.

Proof of work

Findings & Labs

Loading...

Services

Areas of Practice

Penetration Testing

Simulated attacks to find exploitable vulnerabilities in your infrastructure.

Vulnerability Assessment

Scanning and analysis of systems and applications for security weaknesses.

Security Audits

Review of security policies, configurations, and compliance posture.

Network Security

Design and hardening of secure network architectures.

Expertise

Tools & Technologies

Burp Suite · Nmap · Metasploit · Wireshark · Kali Linux · Splunk · Nessus · Python · Bash

Background

About

I focus on offensive security and vulnerability research across modern web, API, and infrastructure environments.

My work prioritizes reproducible findings, clear documentation, and practical remediation over noisy checklists or theoretical risk.

Operating principles

  • Evidence-ledExploit chains reproduced with clear artefacts and business impact.
  • CollaborativePartnering with engineering and security teams to validate fixes.
  • PragmaticActionable prioritisation instead of noisy checklists.