ABOUT ME

I’m Hossein Mahdavi, a bug bounty hunter and web application penetration tester from Iran. I specialize in finding vulnerabilities in web applications and turning complex security challenges into simple, actionable solutions. With speed, precision, and attention to detail, I ensure that every system I test is secure, functional, and resilient against attacks.
My work goes beyond identifying flaws — I provide clear guidance for remediation and help teams implement fixes confidently. Active on Hackravan, I am passionate about raising real-world security standards and making web applications safer, more reliable, and trustworthy for users.

WHAT I'M DOING

Web App Penetration Testing

Comprehensive security testing to protect your web applications from vulnerabilities.

Bug Bounty Hunting

Discover and report critical bugs to make apps safer and more resilient.

Security Audits & Hardening

Analyze and harden your systems to prevent attacks and data leaks.

Incident Response & Guidance

Fast triage, actionable advice, and clear remediation for security incidents.

MY SKILLS

Web Application Security65%
Penetration Testing70%
Networking60%
Linux Security55%

COURSES & CERTIFICATIONS

PHP

Completed PHP programming course with practical projects and web development experience.

Python

Completed Python programming course focusing on web development and automation.

JavaScript

Advanced JavaScript course covering frontend frameworks and dynamic web apps.

Golang

Completed Go programming course with focus on backend and concurrent systems.

CEH

Certified Ethical Hacker course for penetration testing and cybersecurity fundamentals.

Network+

Network+ certification course covering networking concepts and infrastructure.

OWASP

Completed OWASP web security course with practical web app vulnerability testing.

Linux

Linux administration and command-line proficiency course completed successfully.

CYBERSECURITY ROADMAP

UPCOMING SKILLS & COURSES

WEB APPLICATION PENETRATION TESTING

Next 6 months

Focus on OWASP Top 10 vulnerabilities, SQLi, XSS, CSRF, and practical web pentesting exercises.

CEH (CERTIFIED ETHICAL HACKER)

Next 9 months

Complete the CEH course, covering footprinting, scanning, system hacking, and social engineering techniques.

NETWORK SECURITY & NETWORK+

Next 18 months

Learn network protocols, firewall configurations, IDS/IPS, and secure network architecture principles.

LINUX SECURITY & HARDENING

Next 24 months

Deep dive into Linux server security, permissions, SELinux, firewall rules, and secure service configuration.

ADVANCED EXPLOIT DEVELOPMENT

Next 36 months

Develop skills in buffer overflow exploitation, reverse engineering, and crafting advanced payloads.