Every finding below is anonymized but rooted in practical offensive testing. Focus is always exploitability, business impact, and responsible remediation.
Case Archive
Reverse Engineering
POS executable leaked hardcoded SQL credentials
Reverse engineered a VB-based cloud-sync binary and extracted embedded SQL credentials, then validated database access path.
Sensitive billing and customer data at risk
Vendor rotated credentials and patched code
WebSocket Exposure
University socket channels leaked student records
Hidden endpoints discovered during recon leaked student data over WebSocket streams.
Leak manually verified with reproducible request flow