Dusan Jevtic
AboutBlogContact
$ nmap -sV target.com
> exploit.py --target
[+] Vulnerability found
Security Research & Insights

Dusan Jevtic

Penetration Tester & Offensive Security EngineerBreaking down security barriers, one exploit at a time

Let's Connect
Introduction

Who I Am

My name is Dusan Jevtic and I am 23 years old.

I'm a penetration tester and offensive security engineer with expertise in web, mobile, and network penetration testing.

I specialize in identifying vulnerabilities, conducting security assessments, and helping organizations strengthen their overall security posture.

Through this blog, I share my knowledge, tools, and experiences from the field of cybersecurity to help fellow security professionals and enthusiasts learn and grow.

Web Security

Expert in web application penetration testing

Android Security

Android security assessments

Network Security

Infrastructure and network penetration testing

Knowledge Sharing

Helping the security community grow

Projects Completed

Successfully delivered security assessments

0+

Blog

In-depth technical writeups and research

The Ultimate Guide to Cybersecurity Frameworks: MITRE, OWASP, NIST, CWE/CVE, and Compliance
Cybersecurity

The Ultimate Guide to Cybersecurity Frameworks: MITRE, OWASP, NIST, CWE/CVE, and Compliance

A detailed guide to the major cybersecurity frameworks, MITRE ATT&CK, OWASP, NIST, CWE/CVE, and compliance standards, and how they fit together to describe attacker behavior, weaknesses, vulnerabilities, and organizational security.

Security FrameworksMITREOWASPNISTCWECVECompliance
November 27, 2025•14 min read
A Pentester's Guide to File Upload Vulnerabilities
Web Security

A Pentester's Guide to File Upload Vulnerabilities

Understanding file upload vulnerabilities from a pentester's perspective, including common pitfalls, attack techniques, and exploitation methods.

PentestingFile UploadWeb SecurityGuide
September 1, 2025•12 min read
A Complete Guide to Access Control Vulnerabilities
Web Security

A Complete Guide to Access Control Vulnerabilities

A clear breakdown of access control vulnerabilities, untangling confusing terms like IDOR, BOLA, and BFLA, with real examples that show how they appear in modern applications.

PentestingAccess ControlWeb Security
August 27, 2025•18 min read
View All Posts
Get In Touch

Let's Connect

Interested in collaboration, have questions about security, or want to discuss potential projects? Let's connect!

Continue to contact page

Direct Message

Send me a message and I'll get back to you within 24 hours

Schedule a Call

Book a consultation to discuss your security needs in detail

Project Inquiry

Have a specific project in mind? Let's discuss how I can help