Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@alpernae
alpernae
Follow
View alpernae's full-sized avatar
👀
Hacking

Alperen alpernae

👀
Hacking

Highlights

  • Pro

Block or report alpernae

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse
alpernae/README.md

Application Security Researcher

Visitor Count

I’m an application security researcher and tool developer who treats security as a product feature. I hunt vulnerabilities through bug bounties, run intensive fuzzing campaigns, and build automation to catch flaws earlier in the pipeline. I’m exploring AI-assisted triage and detection to scale secure development across teams. Always open to collaborating on tooling, audits, or POCs.

Github BadgeHackerOneIntigritiExploit_DB

What I’m Building & Learning

🔍Focus: Crushing app vulnerabilities, hunting bugs and automating security testing.

🛠️Current Project:AuthMutator — Burp Suite extension for experimenting with authentication issues and attack simulations.

🌱Learning:Game Hacking — exploring memory manipulation, cheat detection, and reverse engineering.

🤝Collaborating On: Open-source tooling for CI/CD security and automated app-sec workflows.

💡Fun Fact: I once found a critical bug at 3 AM fueled by coffee and sheer curiosity — caffeine + curiosity = 🔥.

Reported CVEs

I actively hunt for security flaws and share my findings responsibly. Here are a few notable vulnerabilities I've uncovered:

  • CVE-2024-40422 – Path Traversal in DEVIKA-AI.Details
    This vulnerability allowed attackers to access sensitive files on the server, highlighting the importance of strict input validation in AI platforms.

  • CVE-2022-54321 – SQL Injection in an E‑Commerce CMS.Details
    A classic SQL injection flaw that could expose customer data. It reinforced my focus on automating detection of injection issues in web applications.

  • CVE-2020-35241 – Cross-site Scripting in FlatPress CMS.Details
    This XSS vulnerability demonstrated how even small content management systems can pose significant security risks if input is not properly sanitized.

Blog & Write-Ups

I love sharing what I learn from my security research and bug bounty adventures. Here’s a glimpse of my recent posts:

Tech Stack & Tools

JavaScriptPythonTypeScriptGoC#BashNode.jsReactNext.jsDjangoFlaskExpress.jsPostgreSQLMySQLMongoDBRedisDockerGitLinuxBurp SuiteVSCodeAWSAzureGCP

Let's Connect!

XMediumLinkedInInstagramYouTubeTwitch

PinnedLoading

  1. AIHTTPAnalyzerAIHTTPAnalyzerPublic

    AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovative extension harnesses the power of AI to automate vulner…

    Java 63 20

  2. AuthMutatorAuthMutatorPublic

    Auth Mutator is a Burp Suite extension that helps you experiment with mutated authentication requests while keeping the original traffic intact. It applies user-defined replace rules, removes authe…

    Java 16 4

  3. bugbountybugbountyPublic

    Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into your security journey, you'll find tools, notes, and scripts …

    Python 11 4

  4. NotesPlusNotesPlusPublic

    Notes+ is a Burp Suite extension designed to provide a seamless note-taking experience directly within Burp Suite. It allows security testers and developers to efficiently create, manage, and organ…

    Java 3

  5. gofuzzgofuzzPublic

    GoFuzz is a simple and efficient open-source fuzzing scanner designed to discover directories and files on a target web server or application.

    Python 6

  6. vulnerability-researchvulnerability-researchPublic

    Python


[8]ページ先頭

©2009-2026 Movatter.jp