I'm Gobinda — a cybersecurity enthusiast and ethical hacker passionate about learning how systems work and how they can be secured.
I'm currently learning Web Application Security, Bug Bounty Hunting, OSINT, and Recon. I explore platforms like HackerOne and Bugcrowd to understand how real-world security programs work.
As a self-taught learner and student, I believe in learning by doing — solving CTF challenges, studying real-world vulnerabilities, and building my skills one step at a time.
Automated recon pipeline chaining Nmap, Nikto, and SQLMap to generate a full attack surface report for web targets in minutes.
Custom OSINT framework for gathering digital footprints — emails, subdomains, IPs, and social profiles from a single target domain.
Detailed writeups of real vulnerabilities — XSS, IDOR, SSRF, and more — reported through HackerOne and Bugcrowd with full PoCs.
Solutions to 50+ CTF challenges on HackTheBox and TryHackMe spanning web exploitation, crypto, reverse engineering, and forensics.
Actively learning web security concepts through platforms like PortSwigger Web Academy, practicing vulnerability identification in lab environments.
LEARNING ✓Exploring bug bounty hunting on HackerOne and Bugcrowd. Currently practicing on test environments and building skills to submit first valid reports.
ACTIVEParticipating in beginner-friendly CTF challenges on TryHackMe and HackTheBox to build hands-on skills in web and OSINT categories.
ONGOINGLearning cybersecurity and open to connecting with the community. Feel free to reach out for CTF collaborations, learning resources, or just to say hi!