Breaking things before the bad guys do. I live at the intersection of code and chaos—hunting zero-days, exploiting flaws, and turning vulnerabilities into lessons. Bug bounties pay the bills; CTFs sharpen the skills. If it's connected, it can be hacked. 🔓
class SecurityResearcher:
def __init__(self):
self.name = "Sanjok Karki"
self.role = "Security Research Engineer"
self.weapons = ["Web", "API", "Mobile", "Thick Client"]
self.currently_breaking = ["Source Code", "Binaries", "Crypto"]
self.motto = "If you didn't build it, you can still break it :P"💻 Obsessed with offensive security—if it exists, it has bugs.
⛳ Active on Bug Bounty platforms & CTF battlegrounds.
✍ Expertise: Web | API | Mobile | Thick Client exploitation.
🔭 Deep diving into: Code Review, Binary Exploitation, Reverse Engineering, OSINT & Cryptography.
🌏 More at sanjokkarki.com.np
"Security is not a product, but a process."



























