Vulnerability Researcher at spiderSilk
All about bug bounty (bypasses, payloads, and etc)
Useful "Match and Replace" burpsuite rules
Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)
Go script for bypassing 403 forbidden
CTF Writeups
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks