Available for hire

Raunak Gupta

Security Researcher

Freelance security researcher and bug bounty hunter specializing in Android, Web, and API security. Passionate about open-source, AI, and LLMs. Legally helps companies secure their digital assets through ethical hacking & responsible disclosure.

Raunak Gupta Raunak Gupta Alt

Recent Activities

Bug Bounty

Reported critical vulnerabilities in multiple corporate web applications, receiving high severity ratings and Hall of Fame recognition.

Tool Release

Developed and published multiple original tools focused on Android and web application security testing to aid the community.

Blog Post

Published detailed write-ups covering topics like Broken Access Control, Injection Vulnerabilities, and unique Business Logic Flaws.

Security Projects

Bug Bounty Findings

Exploiting Broken Access Control to Access My College Panel

Critical

A detailed write-up on how I discovered and exploited a vulnerability to access my college's internal panel without needing any credentials.

View Report

Comment Section Takeover via IDOR on GeeksForGeeks.com

High

A write-up on how a single unauthorized request exploiting Insecure Direct Object Reference (IDOR) allowed me to take control of the comment section on the GFG platform.

View Report

Security Tools

Elite Google Dorks Search by Biscuit

A powerful search tool by Biscuit to uncover sensitive files, login panels, and vulnerable parameters using curated Google dorks.

Google Dorks Recon Information Gathering

Automation Scripts

BugBash One

A one-stop script to set up essential bug bounty tools instantly. Simplifies your recon and automation setup in a single run.

View on GitHub

Android Export Viewer

A lightweight tool to extract and display exported components from Android apps, helping identify exposed activities, services, and receivers for security analysis.

View on GitHub

Blogs & Proof of Concepts

Cover
May 7, 2025 2 min read

From JS Recon to HTML Injection

A quick walkthrough on how JS recon uncovered an HTML injection vulnerability for potential exploitation.

HTML Injection Client-Side
Read More
Cover
May 6, 2025 2 min read

Hacking Hospital: Mass PII Leak

A case study on how a vulnerability in a hospital system led to unauthorized access and exposure of sensitive patient information.

PII Exposure Healthcare
Read More
Nov 10, 2024 4 min read

30 Must-Read Books to Learn Hacking

A curated list of 30 essential books covering ethical hacking, web security, networking, malware analysis, and more for all skill levels.

Read More
Nov 5, 2024 5 min read

55 YouTube Channels to Learn Hacking

A curated list of the best YouTube channels to learn ethical hacking, bug bounty, and cybersecurity from experts around the world.

Read More

Infosec Documentation

Vulnerabilities

Insecure Direct Object References (IDOR)

Detailed writeup on identifying and exploiting IDOR vulnerabilities with mitigation strategies.

Read Documentation

WordPress Pentesting Guide

Guide to identifying and exploiting common WordPress issues like vulnerable plugins, weak admin panels, and misconfigurations.

Read Documentation

GraphQL API Security Testing

Short guide on exploiting GraphQL flaws like introspection, unauthorized access, and data leaks.

Read Documentation

Security Tools

Burp Suite

Complete guide to using Burp Suite for web application security testing.

Read Documentation

Browser Extension for Bug Bounty

A handpicked list of browser extensions that enhance productivity, automation, and reconnaissance during bug bounty hunting.

Read Documentation

Hall of Fame

logo

Substack

Medium
Reported: May 2025
Race Condition Insecure API

Concurrency flaw allowing users to manipulate a supposedly atomic increment operation.

View Acknowledgement ↗
logo

Samsung

Low
Reported: September 2025
Security Bypass Insecure API

Misconfigured AWS S3 bucket leaking sensitive data.

View Acknowledgement ↗
logo

GeeksForGeeks

Medium
Reported: October 2024
Security Bypass Insecure API

Mass Assigment Vulnerability founded in GeeksForGeeks Community section.

View Acknowledgement ↗
logo

Chess.com

Low
Reported: August 2025
Security Bypass Insecure API

Exploiting Insecure API leads to CWE-657: Violation of Secure Design Principles

View Acknowledgement ↗
logo

Arcjet.com

Low
Reported: August 2025
Security Bypass Insecure API

Exploiting Insecure API leads to CWE-657: Violation of Secure Design Principles

View Acknowledgement ↗
logo

Com Olho

Low
Reported: March 2025
Security Bypass Insecure API

Redacted

View Acknowledgement ↗
logo

CK Birla Hospital

Low
Reported: March 2025
Security Bypass Insecure API

Redacted

View Acknowledgement ↗
logo

Sir Ganga Ram Hospital

Low
Reported: April 2025
Security Bypass Insecure API

Redacted.

View Acknowledgement ↗
logo

Max Healthcare

Low
Reported: April 2025
Security Bypass Insecure API

Redacted.

View Acknowledgement ↗
logo

brandmuscle.com

Low
Reported: March 2025
Security Bypass Insecure API

Redacted

View Acknowledgement ↗
logo

Skillmate.ai

Medium
Reported: August 2025
Security Bypass Insecure API

Redacted

View Acknowledgement ↗
logo

EC-Council

Medium
Reported: October 2025
Security Bypass Insecure API

A bypass of the email verification security control was discovered, allowing an attacker to spam a victim by using case-sensitive variations of their email address.

View Acknowledgement ↗
logo

Supabase

High
Reported: April 2025
BAC Insecure API

Discovered multiple issues in Supabase APIs and business logic, including lack of rate limiting and input handling flaws.

View Acknowledgement ↗
logo

Zerodha

High
Reported: April 2025
Insecure API Server-side Issues

Reported multiple issues in Zerodha's Android apps and website, targeting business logic and security misconfigurations.

View Acknowledgement ↗
logo

inflectra.com

Medium
Reported: March 2025
Input Validation Open Redirect PII Leak

Improper validation in social media link fields allowed insertion of arbitrary URLs instead of usernames. This business logic flaw enabled user tracking and privacy violations.

View Acknowledgement ↗
logo

wibmo.com

Medium
Reported: April 2025
IDOR Insecure API Email Disclosure

Discovered an IDOR vulnerability in the email update functionality, where changing the user ID in the request exposed other user's email addresses without proper authorization checks.

View Acknowledgement ↗