Freelance security researcher and bug bounty hunter specializing in Android, Web, and API security. Passionate about open-source, AI, and LLMs. Legally helps companies secure their digital assets through ethical hacking & responsible disclosure.
Reported critical vulnerabilities in multiple corporate web applications, receiving high severity ratings and Hall of Fame recognition.
Developed and published multiple original tools focused on Android and web application security testing to aid the community.
Published detailed write-ups covering topics like Broken Access Control, Injection Vulnerabilities, and unique Business Logic Flaws.
A detailed write-up on how I discovered and exploited a vulnerability to access my college's internal panel without needing any credentials.
View ReportA write-up on how a single unauthorized request exploiting Insecure Direct Object Reference (IDOR) allowed me to take control of the comment section on the GFG platform.
View ReportA powerful search tool by Biscuit to uncover sensitive files, login panels, and vulnerable parameters using curated Google dorks.
A one-stop script to set up essential bug bounty tools instantly. Simplifies your recon and automation setup in a single run.
View on GitHubA lightweight tool to extract and display exported components from Android apps, helping identify exposed activities, services, and receivers for security analysis.
View on GitHubA quick walkthrough on how JS recon uncovered an HTML injection vulnerability for potential exploitation.
A case study on how a vulnerability in a hospital system led to unauthorized access and exposure of sensitive patient information.
A curated list of 30 essential books covering ethical hacking, web security, networking, malware analysis, and more for all skill levels.
Read MoreA curated list of the best YouTube channels to learn ethical hacking, bug bounty, and cybersecurity from experts around the world.
Read MoreDetailed writeup on identifying and exploiting IDOR vulnerabilities with mitigation strategies.
Read DocumentationGuide to identifying and exploiting common WordPress issues like vulnerable plugins, weak admin panels, and misconfigurations.
Read DocumentationShort guide on exploiting GraphQL flaws like introspection, unauthorized access, and data leaks.
Read DocumentationComplete guide to using Burp Suite for web application security testing.
Read DocumentationA handpicked list of browser extensions that enhance productivity, automation, and reconnaissance during bug bounty hunting.
Read DocumentationConcurrency flaw allowing users to manipulate a supposedly atomic increment operation.
View Acknowledgement ↗Misconfigured AWS S3 bucket leaking sensitive data.
View Acknowledgement ↗Mass Assigment Vulnerability founded in GeeksForGeeks Community section.
View Acknowledgement ↗Exploiting Insecure API leads to CWE-657: Violation of Secure Design Principles
View Acknowledgement ↗Exploiting Insecure API leads to CWE-657: Violation of Secure Design Principles
View Acknowledgement ↗
Redacted
View Acknowledgement ↗Redacted
View Acknowledgement ↗Redacted.
View Acknowledgement ↗Redacted.
View Acknowledgement ↗Redacted
View Acknowledgement ↗
Redacted
View Acknowledgement ↗A bypass of the email verification security control was discovered, allowing an attacker to spam a victim by using case-sensitive variations of their email address.
View Acknowledgement ↗Discovered multiple issues in Supabase APIs and business logic, including lack of rate limiting and input handling flaws.
View Acknowledgement ↗Reported multiple issues in Zerodha's Android apps and website, targeting business logic and security misconfigurations.
View Acknowledgement ↗Improper validation in social media link fields allowed insertion of arbitrary URLs instead of usernames. This business logic flaw enabled user tracking and privacy violations.
View Acknowledgement ↗Discovered an IDOR vulnerability in the email update functionality, where changing the user ID in the request exposed other user's email addresses without proper authorization checks.
View Acknowledgement ↗
Learn bug bounty hunting with Personal PoCs, live sessions, real vulnerability research, reporting, and disclosure skill
Master Burp Suite tools for web security testing, vulnerability analysis, and ethical hacking.
Aprende bug bounty con PoCs personales, sesiones en vivo, investigación de vulnerabilidades reales, reportes y habilidad