I'm David Jovino, a software engineer passionate about Python, Linux, and Offensive Security.
Currently, I'm focused on building modular, containerized pipelines to streamline and scale Bug Bounty workflows.
- Python (core language for all tools)
- Bash scripting
- Docker & Proxmox
- Tools: Nmap, Nuclei, httpx, ffuf, Subfinder, custom scripts
I'm developing a complex, Dockerized pipeline, where each phase of the Bug Bounty process runs in its own container for better isolation, debugging, and scalability. The pipeline includes:
- ๐ Recon Container โ Subdomain and domain discovery
- ๐ก Enumeration Container โ Service scanning and metadata extraction
- โ๏ธ Parameter Tuning Container โ Separates IPv6, ASN, and edge cases for specialized handling
- ๐จ Common Vulns Container โ Scans for XSS, open redirects, etc.
- ๐งฌ Other Vulns Container(s) โ Modular scripts under development for SSRF, IDOR, etc.
๐ Deivรฃo Recon
The first of many modules โ responsible for initial reconnaissance and data gathering. Fully integrated with tools like Subfinder, httpx, nuclei, and more.
- Automating recon and vuln analysis across targets
- Enhancing detection of advanced vulnerabilities (XSS, SSRF, IDOR)
- Creating reusable modules for Bug Bounty pipelines
โToday, I may be a weak little bug that gets tossed in the wind, washed away by the currents, and drowns, but tomorrow, I may become the butterfly that spreads its colossal wings and flies the open skies!โ
โ Ooe Kintarou