Security Researcher | Red Team Operator | Vulnerability Hunter
Exploring the unknown, breaking boundaries, and securing the digital world — one vulnerability at a time.
- Red Team Operator – Simulating real-world attacks to strengthen defenses
- Blue Team Strategist – Building resilient security architectures and threat detection systems
- Bug Bounty Hunter – Hunting for critical vulnerabilities across web, mobile, and infrastructure
- Reverse Engineer – Dissecting malware and analyzing binary exploits
- Tool Developer – Crafting custom tools for automation, exploitation, and forensic analysis
- Threat Hunter – Proactively tracking adversaries and uncovering hidden threats
- Software Developer – Building secure and scalable applications with robust code architecture
"To challenge the conventional, uncover the unseen, and secure the future — one exploit, one patch, one system at a time."
- Developing advanced offensive security tools
- Exploring novel exploitation techniques in cloud and container environments
- Contributing to open-source security projects
- Sharing knowledge through research blogs and conference talks
- GitHub: YoumuliJiang
"In the world of ones and zeros, I seek the truths hidden in between."
– YoumuliJiang