Gobinda.

_ · Security Researcher · Bug Bounty Hunter
Security Research Bug Bounty Web Security OSINT CTF Player Student Recon
terminal — gobinda@kali
gobinda@kali:~$ whoami
gobinda — ethical hacker
gobinda@kali:~$ cat hall_of_fame.txt
✓ Vulnerabilities Reported
✓ Active Bug Bounty Hunter
gobinda@kali:~$ cat skills.txt
Bug Bounty · OSINT · CTF
Web Security · Recon
gobinda@kali:~$
// 01

About Me

I'm Gobinda — a cybersecurity enthusiast and ethical hacker passionate about learning how systems work and how they can be secured.

I'm currently learning Web Application Security, Bug Bounty Hunting, OSINT, and Recon. I explore platforms like HackerOne and Bugcrowd to understand how real-world security programs work.

As a self-taught learner and student, I believe in learning by doing — solving CTF challenges, studying real-world vulnerabilities, and building my skills one step at a time.

🛡️SECURITY RESEARCH
SoonBUGS REPORTED
CTFBEGINNER
CURIOSITY
// 02

Arsenal

01
Web Security
Burp SuiteXSSSQLiCSRFSSRFNikto
02
Bug Bounty
HackerOneBugcrowdSubdomain EnumAPI TestingIDOR
03
OSINT & Recon
ShodanMaltegotheHarvesterRecon-ngOSINT-fw
04
Network & Pentest
NmapMetasploitWiresharkSQLMapKali Linux
05
Languages
PythonBashJavaScriptHTML/CSSPowerShell
06
CTF & Forensics
HackTheBoxTryHackMeSteganographyGhidraCrypto
// 03

Projects

PROJECT 01 — WEB SECURITY
Auto Recon Framework

Automated recon pipeline chaining Nmap, Nikto, and SQLMap to generate a full attack surface report for web targets in minutes.

PythonNmapNiktoSQLMap
PROJECT 02 — OSINT
OSINT Automation Tool

Custom OSINT framework for gathering digital footprints — emails, subdomains, IPs, and social profiles from a single target domain.

PythonShodan APItheHarvester
PROJECT 03 — BUG BOUNTY
Bug Bounty Writeups

Detailed writeups of real vulnerabilities — XSS, IDOR, SSRF, and more — reported through HackerOne and Bugcrowd with full PoCs.

XSSIDORSSRFAPI
PROJECT 04 — CTF
CTF Writeup Collection

Solutions to 50+ CTF challenges on HackTheBox and TryHackMe spanning web exploitation, crypto, reverse engineering, and forensics.

WebPwnCryptoForensics
// 04

Achievements

🛡️
Security Research

Actively learning web security concepts through platforms like PortSwigger Web Academy, practicing vulnerability identification in lab environments.

LEARNING ✓
🐛
Bug Bounty Hunter

Exploring bug bounty hunting on HackerOne and Bugcrowd. Currently practicing on test environments and building skills to submit first valid reports.

ACTIVE
🏴
CTF Competitor

Participating in beginner-friendly CTF challenges on TryHackMe and HackTheBox to build hands-on skills in web and OSINT categories.

ONGOING
// 05

Contact

Learning cybersecurity and open to connecting with the community. Feel free to reach out for CTF collaborations, learning resources, or just to say hi!

✓ Message sent! I'll get back to you soon.
✗ Something went wrong. Please email me directly at g0b1nd4@proton.me