Skip to content
View alpernae's full-sized avatar
:dependabot:
Working from home
:dependabot:
Working from home

Highlights

  • Pro

Block or report alpernae

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
alpernae/README.md

Hi 👋, I'm Alperen

Application Security Researcher

Visitor Count

I’m an application security researcher and tool developer who treats security as a product feature. I hunt vulnerabilities through bug bounties, run intensive fuzzing campaigns, and build automation to catch flaws earlier in the pipeline. I’m exploring AI-assisted triage and detection to scale secure development across teams. Always open to collaborating on tooling, audits, or POCs.

Github Badge HackerOne Intigriti Exploit_DB

What I’m Building & Learning

🔍 Focus: Crushing app vulnerabilities, hunting bugs and automating security testing.

🛠️ Current Project: AuthMutator — Burp Suite extension for experimenting with authentication issues and attack simulations.

🌱 Learning: Game Hacking — exploring memory manipulation, cheat detection, and reverse engineering.

🤝 Collaborating On: Open-source tooling for CI/CD security and automated app-sec workflows.

💡 Fun Fact: I once found a critical bug at 3 AM fueled by coffee and sheer curiosity — caffeine + curiosity = 🔥.

Reported CVEs

I actively hunt for security flaws and share my findings responsibly. Here are a few notable vulnerabilities I've uncovered:

  • CVE-2024-40422 – Path Traversal in DEVIKA-AI. Details
    This vulnerability allowed attackers to access sensitive files on the server, highlighting the importance of strict input validation in AI platforms.

  • CVE-2022-54321 – SQL Injection in an E‑Commerce CMS. Details
    A classic SQL injection flaw that could expose customer data. It reinforced my focus on automating detection of injection issues in web applications.

  • CVE-2020-35241 – Cross-site Scripting in FlatPress CMS. Details
    This XSS vulnerability demonstrated how even small content management systems can pose significant security risks if input is not properly sanitized.

Blog & Write-Ups

I love sharing what I learn from my security research and bug bounty adventures. Here’s a glimpse of my recent posts:

Tech Stack & Tools

JavaScript Python TypeScript Go C# Bash Node.js React Next.js Django Flask Express.js PostgreSQL MySQL MongoDB Redis Docker Git Linux Burp Suite VSCode AWS Azure GCP

Let's Connect!

X Medium LinkedIn Instagram YouTube Twitch

Pinned Loading

  1. AIHTTPAnalyzer AIHTTPAnalyzer Public

    AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovative extension harnesses the power of AI to automate vulner…

    Java 59 19

  2. AuthMutator AuthMutator Public

    Auth Mutator is a Burp Suite extension that helps you experiment with mutated authentication requests while keeping the original traffic intact. It applies user-defined replace rules, removes authe…

    Java 15 4

  3. bugbounty bugbounty Public

    Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into your security journey, you'll find tools, notes, and scripts …

    Python 11 5

  4. NotesPlus NotesPlus Public

    Notes+ is a Burp Suite extension designed to provide a seamless note-taking experience directly within Burp Suite. It allows security testers and developers to efficiently create, manage, and organ…

    Java 3

  5. gofuzz gofuzz Public

    GoFuzz is a simple and efficient open-source fuzzing scanner designed to discover directories and files on a target web server or application.

    Python 6

  6. vulnerability-research vulnerability-research Public

    Python