Offensive Security Researcher

Chowdhury

Faizal Ahammed

I am a

Senior Cloud IAM Engineer at Synchrony Financial.Building secure systems by knowing exactly how they break.

7+
Years
9
CVEs
24
CTF Wins
5
Certs
// about me

About Me

Breaking things to make them stronger

~/about/stats.sh
$ cat stats.json | jq '.'
{
"CVEs_Published": "6",
"CTF_Wins": "24",
"Certifications": "5",
"Years_Experience": "7+",
"Tools_Built": "3",
"Status": "Breaking Things"
}
$

I'm a 24-year-old security enthusiast who's been breaking things since my teens. With 7+ years in offensive security, I've evolved from curious script kiddie to a seasoned penetration tester and cloud security architect.

Currently serving as a Senior Cloud IAM Engineer at Synchrony Financial, I architect enterprise-scale identity and access management solutions while maintaining my offensive edge through red teaming and bug bounty hunting.

I hold multiple CVEs across SSRF, RCE, IDOR, and XSS vulnerability classes, and I've competed in CTFs at both national and international levels. My unique blend of offensive security and cloud engineering gives me an attacker's perspective on defense — I build secure systems because I know exactly how they break.

// cve discoveries

CVE Discoveries

Vulnerabilities responsibly disclosed across SSRF, RCE, IDOR, and XSS classes

CVE-2022-2170
CVE-2022-2170Medium
XSS

Cross-Site Scripting vulnerability due to improper sanitization of plugin settings. Allows high-privilege users to inject malicious scripts even when unfiltered_html is disabled. Affects versions before 1.0.4.

View Advisory
CVE-2025-67436
CVE-2025-67436Medium
RCE

Authenticated Remote Code Execution vulnerability in PluXml CMS version 5.8.22. Allows administrators to inject malicious PHP webshells into theme files such as home.php via improper neutralization of special elements.

View Advisory
CVE-2025-68454
CVE-2025-68454Critical
RCE

Authenticated RCE through Twig Server-Side Template Injection (SSTI) in Craft CMS. Exploitable via the Twig map filter in text fields under Settings or through the System Messages utility. Requires admin access and allowAdminChanges enabled.

View Advisory
CVE-2026-25498
CVE-2026-25498Critical
RCE

Remote Code Execution vulnerability in Craft CMS via the assembleLayoutFromPost() function in Fields.php. Fails to sanitize user-supplied configuration data before passing to Craft::createObject(), allowing authenticated administrators to inject malicious Yii2 behavior configurations for arbitrary command execution.

View Advisory
CVE-2026-27129
CVE-2026-27129High
SSRF

Server-Side Request Forgery protection bypass in Craft CMS GraphQL Asset mutation. The SSRF validation uses gethostbyname() which only resolves IPv4. Hostnames with only AAAA (IPv6) records return the hostname itself, bypassing the blocklist completely.

View Advisory
CVE-2026-27127
CVE-2026-27127High
SSRF

Time-of-Check-Time-of-Use (TOCTOU) vulnerability enabling DNS rebinding attacks. Allows attackers to bypass SSRF protections by returning different IP addresses during validation vs actual request. Bypasses CVE-2025-68437 fix, granting access to all blocked IPs.

View Advisory
CVE-2026-29069
CVE-2026-29069Medium
Auth Bypass

Unauthenticated users can access the actionSendActivationEmail() endpoint without permission checks for pending users. Attackers can trigger activation emails for any pending user account by knowing/guessing a user ID, potentially leading to unauthorized account activation.

View Advisory
CVE-2026-28784
CVE-2026-28784High
RCE

Remote Code Execution vulnerability via the Twig map filter in text fields accepting Twig input. Exploitable through Settings in Craft control panel or the System Messages utility. Requires admin access with allowAdminChanges enabled, or non-admin access to System Messages.

View Advisory
CVE-2026-31867
CVE-2026-31867Medium
IDOR

Insecure Direct Object Reference (IDOR) vulnerability in Craft Commerce's cart functionality. Allows users to hijack any shopping cart by knowing or guessing its 32-character number, enabling takeover of shopping sessions and potential PII exposure. No ownership validation is performed - the CartController only checks if the order exists and is incomplete.

View Advisory
// certifications

Certifications

Validated offensive security expertise

OSCP+

OffSec Certified Professional+

OffSec
OffSec
View Credential
CRTA

Certified Red Team Analyst

CyberWarFare Labs
View Credential
AD-RTS

Certified AD Red Team Specialist

CyberWarFare Labs
View Credential
CNPen

Certified Network Pentester

SecOps Group
The SecOps Group
View Credential
CAP

Certified AppSec Practitioner

SecOps Group
The SecOps Group
View Credential
// ctf achievements

CTF Achievements

National and international competition wins

24
Competition Wins
Across national & international CTFs
2024
2 wins
Runner Up
Blackhat USA CTF
BugCrowd
5th Place
Blackhat Asia CTF
BugCrowd
2023
7 wins
Winner
Bsides Bangalore B5CTF
BSides Bangalore
Winner
Nullcon Goa CyberChaze CTF
Nullcon
1st Place
Sudo Override CTF
IIT Patna
Runner Up
IIT Madras Shaastra CTF
IIT Madras
Runner Up
TCS HackQuest Season 7
TCS (All India)
3rd Place
cruXipher CTF
BITS Pilani, Hyderabad
1st Place
HackTheBox CTF
IIT Bhubaneswar
2022
12 wins
1st Place
IIT Madras Shaastra CTF
IIT Madras
1st Place
JSBA CTF
John Molson Supply Chain & BTA
1st Place
Central InfoSec CTF
Central InfoSec
1st Place
Bastion Rungu CTF
Bastion Technologies
Winner
INFOCOM Hackstars CTF
INFOCOM
Runner Up
BSides Ahmedabad CTF
BSides Ahmedabad
4th Place
West Bengal Cyber Challenge
West Bengal
3rd Place
ParSec CTF
IIT Dharwad
2nd Place
ZionCTF
IIT Mandi
1st Place
CyberYami CTF
Cyberyami
2nd Runner Up
Aurora 2.0 CTF
DTU Delhi
1st Place
HackTheBox CTF
IIT Bhubaneswar
2021
3 wins
3rd Place
wtfCTF
Manipal Institute of Technology
Winner
Ground Zero WB Hackathon
ISOEH
Winner
NullTrace CTF
c0c0n
// arsenal

Arsenal

Languages, tools, and techniques in the toolkit

Python
Bash
Golang
JavaScript
AWS
Terraform
CloudFormation
Cloud Security Architecture
Red Teaming
Penetration Testing
Vulnerability Research
Exploit Development
Reverse Engineering
AppSec (SAST/DAST)
Sliver C2
Cobalt Strike
Caldera
Agentic AI Development
// open source

Open Source

Security tools built and released for the community

~/projects/adcsdumper
>

ADCSDumper

Active Directory Certificate Services enumeration and exploitation tool for red team operations.

PythonActive DirectoryRed TeamADCS
View on GitHub
~/projects/catrole
>

catrole

AWS IAM role enumeration and privilege escalation discovery tool for cloud security assessments.

PythonAWSIAMCloud Security
View on GitHub
~/projects/tfswitch
>

tfswitch

Terraform version manager for seamless switching between Terraform versions in your workflow.

GoTerraformDevOpsCLI
View on GitHub
// contact

Contact

Let's connect

~/connect.sh
visitor@faizal:~$ ./connect.sh
[*] Establishing secure connection...
[+] Available channels:

Available for security consulting, bug bounty collaboration, red team engagements, and speaking opportunities.