Certifications & Achievements

Professional certifications, CTF rankings, and bug bounty program participation demonstrating expertise and commitment to continuous learning.

Professional Certifications

Industry-recognized credentials validating my expertise.

No certifications added yet.

CTF Rankings & Achievements

Competitive accomplishments in international cybersecurity competitions.

#5

Bugcrowd x Black Hat USA International CTF 2025

Ranked among the top 5 teams globally in web security challenges.

#18

Iran Tech Olympics International CTF 2025

Top-ranked performer in international cybersecurity competition.

Top Ranked

Multiple Public & Private Bug Bounty Programs

Consistent top performer on Bugcrowd, YesWeHack, Intigriti, and Standoff365.

Bug Bounty Programs

Platforms and organizations where I actively report vulnerabilities.

Trophy

Bugcrowd

Target

YesWeHack

Shield

Intigriti

Swords

Standoff365

Search

Google

Smartphone

TikTok

Pin

Pinterest

Key Achievements

Notable accomplishments that demonstrate impact and expertise.

Discovered 100+ vulnerabilities across diverse applications and platforms
Helped 25+ organizations remediate critical security issues
Ranked in top 5 of international Black Hat CTF competition
Active bug bounty hunter on 5+ platforms with consistent results
Multiple valid submissions to Fortune 500 company security programs
Expertise recognized through certifications from leading cybersecurity organizations
Contributed to open-source security tools and research
Mentored aspiring security professionals in VAPT methodologies

Continuous Learning

Commitment to staying current with evolving security threats.

The cybersecurity landscape evolves rapidly. I maintain my expertise through:

  • Regular completion of advanced security training and labs
  • Active participation in CTF competitions and capture-the-flag events
  • Continuous bug bounty hunting and real-world vulnerability research
  • Membership in security communities and professional organizations
  • Attending security conferences and workshops
  • Reading threat research and vulnerability disclosures
  • Experimenting with emerging attack vectors and techniques