ABOUT ME
I’m Hossein Mahdavi, a bug bounty hunter and web application penetration tester from Iran. I specialize in finding vulnerabilities in web applications and turning complex security challenges into simple, actionable solutions. With speed, precision, and attention to detail, I ensure that every system I test is secure, functional, and resilient against attacks.
My work goes beyond identifying flaws — I provide clear guidance for remediation and help teams implement fixes confidently. Active on Hackravan, I am passionate about raising real-world security standards and making web applications safer, more reliable, and trustworthy for users.
WHAT I'M DOING
Web App Penetration Testing
Comprehensive security testing to protect your web applications from vulnerabilities.
Bug Bounty Hunting
Discover and report critical bugs to make apps safer and more resilient.
Security Audits & Hardening
Analyze and harden your systems to prevent attacks and data leaks.
Incident Response & Guidance
Fast triage, actionable advice, and clear remediation for security incidents.
MY SKILLS
COURSES & CERTIFICATIONS
PHP
Completed PHP programming course with practical projects and web development experience.
Python
Completed Python programming course focusing on web development and automation.
JavaScript
Advanced JavaScript course covering frontend frameworks and dynamic web apps.
Golang
Completed Go programming course with focus on backend and concurrent systems.
CEH
Certified Ethical Hacker course for penetration testing and cybersecurity fundamentals.
Network+
Network+ certification course covering networking concepts and infrastructure.
OWASP
Completed OWASP web security course with practical web app vulnerability testing.
Linux
Linux administration and command-line proficiency course completed successfully.
CYBERSECURITY ROADMAP
UPCOMING SKILLS & COURSES
WEB APPLICATION PENETRATION TESTING
Next 6 monthsFocus on OWASP Top 10 vulnerabilities, SQLi, XSS, CSRF, and practical web pentesting exercises.
CEH (CERTIFIED ETHICAL HACKER)
Next 9 monthsComplete the CEH course, covering footprinting, scanning, system hacking, and social engineering techniques.
NETWORK SECURITY & NETWORK+
Next 18 monthsLearn network protocols, firewall configurations, IDS/IPS, and secure network architecture principles.
LINUX SECURITY & HARDENING
Next 24 monthsDeep dive into Linux server security, permissions, SELinux, firewall rules, and secure service configuration.
ADVANCED EXPLOIT DEVELOPMENT
Next 36 monthsDevelop skills in buffer overflow exploitation, reverse engineering, and crafting advanced payloads.