Jonas Resch
Security Researcher // Pentester // CS Student
Security-minded computer science student at HS Mittweida, focusing on application security and practical penetration testing. Building offensive security tools and translating findings into clear, actionable results.
About Me
I'm a B.Sc. Applied Computer Science student at the University of Applied Sciences Mittweida (Germany), currently in my 2nd semester, with a strong passion for IT security.
My workflow involves running structured, reproducible security checks and translating findings into clear, actionable recommendations. I specialize in web application security and build custom tools to automate offensive security tasks.
Currently working on secure code review and automated pentesting tools, and actively contributing to vulnerability research through responsible disclosure.
IDOR, Injection, SSRF, authentication bypass, and business logic vulnerabilities in modern web applications.
Structured, reproducible security assessments with clear reporting and actionable remediation guidance.
Building automated scanners and offensive tools that make pentesting workflows faster and more thorough.
Finding and responsibly disclosing vulnerabilities, contributing to a more secure ecosystem.
Projects
Open-source tools and utilities I've built and maintain.
FlipperZero BadUSB
Next-generation modular payload system for Flipper Zero BadUSB — advanced DuckyScript payloads with remote module loading.
Leaktor
Secrets scanner built for speed. Combines pattern matching, entropy analysis, and live validation to catch leaked credentials before they hit production.
Inscribe
Fast, elegant USB imaging for Linux. A modern, open-source alternative to balenaEtcher with a clean UI, clear progress, and power-user controls.
Tech Stack
Languages, tools, and platforms I work with daily.
CVE Disclosures
Responsibly disclosed vulnerabilities. Each finding goes through coordinated disclosure with the affected vendor before publication.
Arbitrary File Deletion via Path Traversal in Wiki Page Update
Path traversal vulnerability in the updateWikiPage function allows authenticated users to delete arbitrary files on the server via the old_title parameter.
Latest Writeups
CTF solutions, vulnerability analyses, and technical deep-dives into security topics.
Get in Touch
Interested in collaboration, responsible disclosure, or just want to talk security? Reach out.