Made by Devi AI By using this website, you agree to the following terms and conditions


Behind every secure system lies a hidden flaw, waiting to be uncovered. The greatest risk isn’t the vulnerability itself it's the illusion that you're invincible.

Who Am I ?

Bug Bounty Hunter, Web Application Security Specialist, Cybersecurity Enthusiast, and Security Researcher. I’m passionate about identifying and mitigating vulnerabilities, with practical experience in securing systems and applications. Recognized and rewarded by top organizations, I stay committed to learning, evolving, and excelling in the dynamic world of cybersecurity.

Professional Contributions

I’ve had the privilege of contributing to global cybersecurity through responsible disclosure and professional security services. My efforts have been formally acknowledged by the National Critical Information Infrastructure Protection Centre (NCIIPC) and through 5+ valid vulnerability reports on Bugcrowd. In addition, I’ve provided security services to external companies, identifying vulnerabilities with the potential to significantly impact their business operations. These findings have not only strengthened the security posture of the organizations involved but also reinforced my commitment to ethical hacking and responsible vulnerability disclosure. This is just a glimpse of my work—my broader experience reflects a deep dedication to protecting digital infrastructure across various sectors.

Tools

-An automated recon tool (REX) that combines multiple Go-based tools to find subdomains and URLs in a single command.

-A phishing demo (Phishy) that shows how attackers can trick users using fake QR code-based websites.

-A simple web tool to test if a site is vulnerable to clickjacking by allowing iframe embedding.

-A Bash-based GitHub Dorking Tool to generate search links for finding exposed sensitive information.

about

Hands-On Research & Write-Ups

I publish technical articles focused on web application security, vulnerability research, and real-world bug bounty findings. My writing aims to provide clear, practical insights for cybersecurity professionals and enthusiasts, blending deep technical analysis with lessons learned from hands-on experience.

about

Contact me


Abhay A L

© 2023 All rights reserved.