// IDENTITY :: D3ADSHOT

I
AM
D3ADSHOT.

Bug bounty hunter & offensive security researcher.
I find what shouldn't be there.

D3ADSHOT Avatar
0Platforms Active
0+Years Operational
02 / 06

TOOLS & PROJECTS

// 01[ RED TEAM TOOL ]

D3adphish

GoPhish fork engineered to strip every detectable fingerprint — X-Mailer headers, tracking params, session cookies, server identifiers. One binary, zero traces. For authorized engagements only.

GoGoPhishSQLiteLinux
// 02[ EXPLORE ]

More on GitHub →

All public repos, tools, and experiments.

03 / 06

CAPABILITIES

// 01

Web App Pentesting

Full-scope web application assessments targeting authentication, authorization, and business logic , the bugs that scanners miss.

  • IDOR chain exploitation
  • Business logic bypass
  • SSRF & blind SSRF
  • Stored & DOM XSS
  • HTTP request smuggling
  • File upload bypass
  • Insecure deserialization
  • Race condition attacks
  • JWT algorithm confusion
// 02

Social Engineering

Human-layer attack simulation. Pretexting, persona building, and OSINT-driven targeting to expose the weakest link in any organization.

  • Pretexting & persona building
  • OSINT-driven targeting
  • Vishing simulation
  • Authority & urgency manipulation
  • Callback phishing
  • LinkedIn reconnaissance
  • Physical security bypass
  • USB drop campaigns
  • Impersonation attacks
  • Trust exploitation chains
// 03

Phishing Campaign Specialist

End-to-end phishing simulation using D3adphish , fingerprint-stripped, fully authorized, and built to test real-world defences.

  • D3adphish framework deployment
  • Domain spoofing & typosquatting
  • Evasion of email security filters
  • SSL certs for phishing domains
  • Credential harvesting pipelines
  • Template design & A/B testing
  • Tracking & open-rate metrics
  • Spear phishing campaigns
  • GoPhish hardening
  • Post-campaign reporting
04 / 06

THE LOADOUT

Multi-VM operator. Riced to perfection.

Kali Linux

Daily driver

Parrot OS

Recon & analysis

Burp Suite Pro

Web app testing

Hyprland

Tiling WM

fish shell

Shell environment

Mullvad VPN

Privacy layer

Claude Code

AI pair programmer

05 / 06

INITIATE CONTACT

Found something I should know about? Let's talk. Bug bounty collabs, red team engagements, OwlSec community, or just a good recon story.