ROLE
Full-Stack Engineer
ORGANIZATION
Lobstr.io
CLEARANCE
Top-Rated · Upwork
UPTIME
10+ years
1M+
RECORDS/DAY
98%
LATENCY ↓
500+
PROJECTS
RCE via Image Headers
Exploited image metadata parsing to achieve remote code execution on production systems.
Password Reset → System Takeover
Chained a forgot-password flaw into full administrative access.
XSS via Meta Tags
Discovered cross-site scripting vector through HTML meta tag injection.
Manual SQL Injection + Python
Deep-dive into manual SQLi techniques automated with Python scripting.
Engineering since ~2015
Jobs completed · 545 hours
Projects incl. private clients
Job Success Score on Upwork
CORE_SYSTEMS
ECOSYSTEM
OFFENSIVE
The Repository
Open-source tools built for engineers who need to decode, scrape, and automate at scale. Each project solves a real-world problem I encountered in production.
deproto
Decoder for Google Maps protobuf format. Reverse-engineered the binary protocol to extract structured location data from obfuscated responses.
bs2json
Converts BeautifulSoup4 Tag objects into clean JSON dictionaries. Eliminates the friction between HTML parsing and structured data processing.
Captcha-Solver
Bypasses Google reCaptcha through image recognition and audio transcription. Built for authorized penetration testing and bot mitigation research.
LinkedIn-Scraper
Extracts connection data from LinkedIn profiles and exports to CSV or MySQL. Clean API for automated network analysis and lead generation.
mobiShell
Browser-based shell environment designed for security researchers. Provides remote command execution through an intuitive web interface.
BTech
Multi-platform GUI tool for extracting database domains and discovering admin panels. Cross-platform reconnaissance utility for authorized engagements.
Consulting Services
I take on a limited number of high-impact engagements each quarter. If your problem involves scale, security, or systems that fight back — let's talk.
Anti-Bot Engineering
Reverse-engineer and bypass enterprise-grade bot detection systems. I analyze fingerprinting techniques, TLS signatures, and behavioral analysis to build undetectable automation.
Data Pipeline Architecture
Design and build high-throughput data collection systems that process millions of records daily. From raw extraction to clean, queryable datasets — engineered for reliability.
Security Assessment
Offensive security testing focused on web applications. I find the vulnerabilities that scanners miss — logic flaws, injection chains, and authentication bypasses.
READY TO ENGAGE?
I respond to every serious inquiry within 24 hours. Describe your problem, and I'll tell you exactly how I'd solve it.
INITIATE_CONTACTTerminal
Type help to see available commands.