I scan the internet for things people forgot were public — exposed APIs, leaking source maps, open inference endpoints, misconfigured infra — and write up what I find.
Currently focused on India's attack surface and on building tooling that uses AI as a reasoning layer, not a scanner.
Now · reconSweeping public OpenAPI / Swagger exposure across India · APAC ranges.
Now · pipelineWhen maps leak: rebuild clients, trace generated API calls, flag bulk-style routes.
Now · labAI-Hack-OS — clustering recon output so prioritisation isn't guesswork.
Now · complianceMapping findings into DPDP · ISO 27001 language for accountable disclosure.
Now · reviewTracing trust boundaries — bulk access & IDOR-class paths get a human pass.
Independent security researcher focused on India and internet-scale reconnaissance, exposure analysis, scanning, building tooling, and publishing what surfaces.
My research targets India's digital attack surface — enormous, fast-growing, largely understudied. Most researchers focus on US/EU. I'm interested in what's happening here.
I build tools to automate the boring parts of recon so I can spend more time on the parts that need human reasoning. Current project — AI-Hack-OS — is an attempt to use AI as a reasoning layer over raw recon, not as another scanner.
If something I publish is useful to you — or wrong — I want to hear about it.
Research questions, collaboration ideas, something interesting you found, or a bug you want a second pair of eyes on. Response time varies based on how deep into a scan I am.
[email protected]