Banner Image

Skills

  • Ai Penetration Testing
  • Bash
  • Cloud Security
  • Penetration Testing
  • Python
  • Vulnerability Assessment
  • Api Penetration Testing
  • Blockchain And Smart Contracts Security Audits
  • Blockchain Security
  • Code Review
  • Cyber Risk Management
  • Ethical Hacking
  • Internet Security
  • Mobile Application Penetration
  • Mobile Applicatopn Penetration Testing

Sign up or Log in to see more.

Services

  • Cybersecurity Expert |Penetration Tester

    $10/hr Starting at $25 Ongoing

    Dedicated Resource

    I am a cybersecurity researcher and bug bounty hunter specializing in web application and API security. I have hands-on experience identifying and responsibly disclosing vulnerabilities across web platforms,...

    Ai Penetration TestingApi Penetration TestingBashBlockchain And Smart Contracts Security AuditsBlockchain Security

About

Securing your applications, one vulnerability at a time.

Self-taught Cybersecurity Researcher and Bug Bounty Hunter with hands-on experience in vulnerability discovery across web applications, AI systems, cloud platforms, and blockchain technologies. Recognized in NASA’s Hall of Fame for responsible vulnerability disclosure. Submitted 300+ vulnerability reports and earned multiple bug bounties from global vulnerability disclosure programs. Skilled in penetration testing, vulnerability assessment, AI security testing, and smart contract security research.


Key Achievements

• Recognized in NASA Hall of Fame for responsible vulnerability disclosure.
• $250 bug bounty from cryptocurrency company.
• $150 bug bounty from vulnerability disclosure program.
• Multiple ₹4000 bug bounties for web and AI vulnerabilities.
• ₹6000 bounty for reporting a P4-level vulnerability.
• $100 bounty for discovering AI chatbot leaking internal employee email addresses.
• Appreciation Certificate from EC-Council for vulnerability disclosure.

Work Terms

- Clear communication before and during the project
- Scope and requirements must be defined before starting
- All testing is conducted ethically and only on authorized systems
- Detailed vulnerability reports will be provided with proof of concept and remediation steps
- Timely delivery based on project scope and complexity
- Revisions and clarifications are supported as needed
- Confidentiality of client data and findings is strictly maintained

I am committed to delivering reliable, responsible, and high-quality security services.