Learn more about his
Tağmaç started to learn software at a young age, turned this hobby into a business and started to earn money during his secondary school years by working freelance.
Tağmaç, who went deeper into the software languages, found vulnerabilities on the projects he wrote and started researching how to close these vulnerabilities and stepped into Cyber Security.
He found his first vulnerability at the age of 13, in a web application he developed himself. Tağmaç, who wanted to improve himself in this field, started to do security research. It found and reported vulnerabilities in many web/mobile, browser plug-ins and computer software. Sometimes when him get bored, it finds security vulnerabilities in some open source applications and prepares exploitation code and presents them on the platform called Exploit-DB.
Tağmaç, who likes to challenge, learn programming languages that he does not know, develop new projects with those programming languages, and constantly learn something new, continues to do new tests and research on more than 10 servers of his own at home.
He still works as a vulnerability researcher in his spare time.
Developed Projects
Vulnerabilities Found in Enterprise Products
Programming Language that Basically knows
Developed Exploit Codes
Check His Resume
He has spent 9+ years working on Development, Server Installation, Network Configuration and Cyber Security. According to his place, the blue team took part in the red team according to his place.
Ahmet Yesevi University
Anadolu University
Cumhuriyet University
Presidency of the Republic of Türkiye Cumhuriyeti
beIN Media Group
BilgeAdam Technology
beIN Media Group
FreeLancer
Cumhuriyet University
Source Code Repository
| Type | Name | Category | Description | Date |
|---|---|---|---|---|
| Daily AbuseIP Collector | Project | The Daily AbuseIP Collector is a .NET 9.0 console application designed to run as a background service within a Docker container. Its primary purpose is to automatically fetch, filter, and store a list of abusive IP addresses from a public blocklist into a MongoDB database. | Sun Dec 15 2024 | |
| Movie Rating System 1.0 - SQL Injection to Remote Code Execution (Unauthenticated) | Exploit | Movie Rating System Unauthenticated SQL Injection and Unauthenticated Remote Code Execution | Tue Jan 04 2022 | |
| Movie Rating System 1.0 - Admin Account Creation (Unauthenticated) | Exploit | Movie Rating System Unauthenticated Admin Account Creation | Tue Jan 04 2022 | |
| Traffic Offense Management System 1.0 - Remote Code Execution (Unauthenticated) | Exploit | Traffic Offense Management System Unauthenticated Remote Code Execution | Tue Aug 31 2021 | |
| Simple Image Gallery 1.0 - Remote Code Execution (Unauthenticated) | Exploit | Simple Image Gallery CMS Unauthenticated Remote Code Execution | Tue Aug 17 2021 | |
| Responsive Tourism Website 3.1 - Remote Code Execution (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Responsive Tourism CMS | Mon Jun 21 2021 | |
| Online Shopping Portal 3.1 - Remote Code Execution (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Online Shopping Portal | Sun Jun 06 2021 |