TT

Toufik Touhami

[ SECURITY RESEARCHER ]

Elite security researcher specialized in offensive operations and financial logic protection. Focused on high-impact vulnerability discovery.
WEB / APIBUG BOUNTYOFFENSIVE TESTING
STATUS: AVAILABLE FOR FREELANCE
[+] GET_RESUME.PDF [+] HIRE_ME
Credentials // 02
+0Y
Experience
SECURITY+
CEH
PNPT
Stats // 03
0+
Vulnerabilities
Impact // 04
$0M+
Assets Secured
Trusted_By +50 big companies // 05
TikTok bigflashskinsthunderpickwasteShadowPayrainLootBearYahooUS DoDPremioTradeitGamdom
Workflow // 06
[01]
RECON

Asset discovery & surface mapping.

[02]
ANALYZE

Manual logic audit & API check.

[03]
EXPLOIT

PoC development & escalation.

[04]
REPORT

Remediation guidance & docs.

Recent_findings // 07
Blind XSS → Admin ATO CRITICAL
> Hijacked sessions via WAF bypass polyglots.
Withdrawal Logic Flaw CRITICAL
> Race condition exploitation in payment gateways.
IDOR: Private Billing Leak HIGH
> Compromised sensitive PII via UUID manipulation.
Services // 08
[+]
WEB APP PENTEST

Manual testing for critical web application flaws.

[+]
API SECURITY REVIEW

Access control, auth, and business logic validation.

[+]
ATTACK SURFACE REVIEW

Recon-focused review for exposed assets and risky paths.

Bounty_Proofs // 09
Proof1Proof2Proof3Proof4Proof5Proof1Proof2Proof3Proof4Proof5
Program Feedback // 10
Fast validation & clear impact
> Triaged quickly with positive feedback on clarity and reproducibility.
High-signal reporting
> Detailed write-up helped the program verify risk and move to remediation faster.
Actionable research notes
> Feedback highlighted strong communication, practical PoCs, and useful technical context.
Contact // 11
> Spam protection is enabled. CAPTCHA must be completed before the form can be sent.
Featured_Report // 12
Multi-Vector Bypass & Response Manipulation → Infrastructure Takeover CRITICAL (10.0)
Links // 14
HackerOne GitHub LinkedIn X / Twitter
System.Tools // 15
[+] BURP SUITE PRO
[+] METASPLOIT
[+] NMAP
[+] PYTHON
[+] WIRESHARK
[+] OWASP TOP 10