πŸŽ€
CyanideHax Academy
  • πŸŽ€Cyanide's Hacker Strategy Archive
  • About
    • 🧸About me
  • Credentials & Cracking
    • πŸˆβ€β¬›Hashcat - cracking hashes
  • Web Exploitation
    • 🧩Injection & Scripting
      • πŸ’‰SQL Injection
  • Reconnaissance & Discovery
    • 🌐Internet-wide Recon
      • πŸ”­Censys
      • πŸ‘€Shodan
  • Extreme / Advanced Exploitation
    • βš™οΈHardware & Microarchitectural
      • πŸ’ΎRowhammer
        • rowhammer.js
    • πŸ•ΈοΈAdvanced Web Exploitation
      • Prototype Pollution β†’ RCE
      • Chained Exploits
Powered by GitBook
On this page
  • Bounties & honorable mentions:
  • NASA - U.S. Space Agency
  • Xenforo Software
  • 4chan.org
  • pika-network.net, jartex-network.net
  • Banknorwegian
  • ascension.gg
  • manacube.net
  • mc-complex.net
  • luckyblock.com (crypto casino)
  • Offensive Security & Vulnerability Research
  • Network-Layer & Wireless Attack Techniques
  • Privilege Escalation & Post-Exploitation
  • Programming & Secure Software Development
  • Platforms, Tooling & Virtualisation
  1. About

About me

NextHashcat - cracking hashes

Last updated 14 days ago

Discord: cyanidee.

Email: admin@cyanide.net

Bugcrowd: cy4n1de

HackerOne: cy4n1de

Bounties & honorable mentions:

NASA - U.S. Space Agency

  • Critical Security Vulnerability (Priority P1 – Highest Severity)

  • Confirmed and acknowledged by NASA's security team.

Xenforo Software

  • Found zero day vulnerability in XenForo (Jan, 2025)

  • Verified by XenForo team (Mar, 2025)

4chan.org

  • Local File Inclusion via double-encoded path traversal (Apr, 2025) (Critical severity)

pika-network.net, jartex-network.net

  • Both domains are part of craftigames.net

  • SQL injection (2021)

  • Hidden virtual host and bypassing CloudFlare firewall with warp (2025) ($250 bounty reward)

Banknorwegian

  • Cross site scripting (XSS) in Banknorwegian (index page) (2024):

  • banknorwegian.dk, banknorwegian.no, banknorwegian.fi, banknorwegian.fi, banknorwegian.de

ascension.gg

  • Personal Github Token leak ($2.5k bounty reward) (2024)

manacube.net

  • SQL injection (2022) ($200 usd bounty reward)

mc-complex.net

  • SQL injection (2024) and LFI (2025)

luckyblock.com (crypto casino)

  • RCE webshell escalated from SQLi (2024)

Offensive Security & Vulnerability Research

  • Web-application exploitation – experienced in finding and exploiting injection flaws, authentication weaknesses, logic errors and misconfigurations during bug-bounties.

    • Command-injection discovery and post-exploitation workflow.

Network-Layer & Wireless Attack Techniques

  • Evil-Twin Wi-Fi compromise – creation of rogue APs for credential theft and traffic interception.

  • ARP-spoofing and man-in-the-middle implants within local subnets.

  • SS7 signalling attacks targeting mobile voice/SMS interception and geolocation.

  • DNS-cache poisoning for upstream redirection and phishing campaigns.

Privilege Escalation & Post-Exploitation

  • Linux privilege-escalation tooling – enumeration, kernel exploit adaptation, capability and misconfiguration abuse.

  • Firewall / IDS evasion – traffic obfuscation, packet-fragmentation, decoys, manual TCP packets and rule-set manipulation to maintain persistence.

Programming & Secure Software Development

  • Python – rapid scripting for reconnaissance, exploit automation, and tooling integration.

  • C and x86-64 assembly – low-level payload crafting, reverse-engineering and buffer overflows.

  • Full-stack web development (secondary focus) – Build and harden Django/Next.js back-ends, manage relational databases (Such as PostgreSQL/MySQL) and non relational databases such as MongoDB. Craft modern TailwindCSS front-end interfaces, design RESTful APIs, and code that follows secure-coding best practices into every layer.

Platforms, Tooling & Virtualisation

  • Advanced Linux administration – hardened server configuration, kernel-module management, SELinux/AppArmor policy tuning.

  • Docker-based lab orchestration – containerised test environments for reproducible exploits and CI security checks.

Official recognition on a top security platform

Listed on

Listed on

Hack The Box Certified Penetration Testing Specialist (HTB CPTS) – trained in full-scope adversarial assessment methodologies.

SQL-injection testing and automation (Boolean-based, time-based, stacked queries, even second order).

Local File Inclusion / directory traversal and buffer-overflow proof-of-concept development.

Zero-day research & exploit authoring – design custom fuzzers, triage crashes into root-cause flaws, build reliable exploits that slip past modern mitigations (ASLR, DEP, stack canaries), and steer the whole coordinated-disclosure cycle through patch diffing and proof-of-fix validation.

🧸
Bugcrowd's Hall of Fame
https://xenforo.com/community/threads/security-issue.228884/#post-1731581
hall of fame
hall of fame
HTB Academy
OWASP Foundation
Fortinet
Wikipedia
Hall of fame - CraftiGames
Hall of fame listing on craftigames.net
https://www.4chan.org/security#thankswww.4chan.org
Hall of fame listing on 4chan.org
Cyanide listed on
hall of fame
Logo