ViSec
Offensive Security • Bug Bounty • Vulnerability Research
About Me
I'm Enay, an offensive security‑focused bug bounty researcher. I work on web security, smart contracts, reverse engineering and cryptographic protocols. I am also passionate about discovering critical security vulnerabilities through bug bounty programs and blockchain security research, with multiple high‑impact reports submitted to major platforms.
Focus Areas
- Web/App Security
- Smart Contract Auditing
- Reverse Engineering
- Crypto/ECDSA Research
Tools I Use
Awards & Achievements
Projects & Research
Resolv
Identified logic flaw in clearPendingRewardsFlagIfEmpty. Exploited the flaw to block claims permanently. Successfully demonstrated impact via local testnet using Web3.py & Ganache.
HydraDX Omnipool
Allowing an attacker to perform thousands of micro trades and drain significant liquidity while manipulating the spot price.
FloQast
window.sdkConfig.proxyUrl: The proxy URL is under floqast.app and is not included in CSP. The cxforward parameter redirects to the Coralogix log endpoint. Log data severity, labels, and a custom msg file are customized.