Learn more about his

Tağmaç started to learn software at a young age, turned this hobby into a business and started to earn money during his secondary school years by working freelance.
Tağmaç, who went deeper into the software languages, found vulnerabilities on the projects he wrote and started researching how to close these vulnerabilities and stepped into Cyber Security.
He found his first vulnerability at the age of 13, in a web application he developed himself. Tağmaç, who wanted to improve himself in this field, started to do security research. It found and reported vulnerabilities in many web/mobile, browser plug-ins and computer software. Sometimes when him get bored, it finds security vulnerabilities in some open source applications and prepares exploitation code and presents them on the platform called Exploit-DB.
Tağmaç, who likes to challenge, learn programming languages that he does not know, develop new projects with those programming languages, and constantly learn something new, continues to do new tests and research on more than 10 servers of his own at home.
He still works as a vulnerability researcher in his spare time.
Developed Projects
Vulnerabilities Found in Enterprise Products
Programming Language that Basically knows
Developed Exploit Codes
Check His Resume
He has spent 9+ years working on Development, Server Installation, Network Configuration and Cyber Security. According to his place, the blue team took part in the red team according to his place.
Ahmet Yesevi University
Anadolu University
Cumhuriyet University
Presidency of the Republic of Türkiye Cumhuriyeti
beIN Media Group
BilgeAdam Technology
beIN Media Group
FreeLancer
Cumhuriyet University
Source Code Repository
| Type | Name | Category | Description | Date |
|---|---|---|---|---|
| Daily CVE Reporter | Project | Daily CVE Reporter is an automated security tool designated to keep researchers updated on the latest vulnerabilities. It fetches new CVEs from the National Vulnerability Database every 24 hours, automatically detects if a Proof of Concept (PoC) exploit exists, and presents the data in a clean, interactive HTML report. | Tue Dec 30 2025 | |
| Daily AbuseIP Collector | Project | The Daily AbuseIP Collector is a .NET 9.0 console application designed to run as a background service within a Docker container. Its primary purpose is to automatically fetch, filter, and store a list of abusive IP addresses from a public blocklist into a MongoDB database. | Sun Dec 15 2024 | |
| Movie Rating System 1.0 - SQL Injection to RCE (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Movie Rating System SQLi to RCE | Tue Dec 21 2021 | |
| Movie Rating System 1.0 - Broken Access Control (Admin Account Creation) | Exploit | Zero-Day Discovery & Exploit Development: Movie Rating System Broken Access Control | Tue Dec 21 2021 | |
| Traffic Offense Management System 1.0 - SQLi to Remote Code Execution (RCE) (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Traffic Offense Management System | Wed Aug 18 2021 | |
| Simple Image Gallery 1.0 - Remote Code Execution (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Simple Image Gallery | Mon Aug 16 2021 | |
| Responsive Tourism Website 3.1 - Remote Code Execution (Unauthenticated) | Exploit | Zero-Day Discovery & Exploit Development: Responsive Tourism CMS | Mon Jun 21 2021 | |
| CVE-2023-38890 – Online Shopping Portal 3.1 Remote Code Execution | Exploit | CVE-2023-38890 - Zero-Day Discovery & Exploit Development: Online Shopping Portal | Thu Jun 17 2021 |