Kader Harsith Mohamed Kani - Profile | Com Olho

Kader Harsith Mohamed Kani

harsithhacks66
Rank: 12
Gender: Male
Age: 18-30
Hacking Level: Intermediate
Top 1%
Qualification: Postgraduation
Status: Freelancer
Last Login: Wed, 20 Aug 2025 11:00:24

Bug Bounty Status Distribution

Vulnerability Types

Journey

Fri, Jun 21, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

11:52 AM

Com Olho

Fri, Jun 21, 2024

First Bug Bounty Report

First Bug Bounty Report: Baazi Games Bug Bounty Program

12:51 PM

Baazi Games

Sat, Jun 22, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: Exam Prep Tool Security Research Reward

02:08 AM

Exam Prep Tool

Sun, Jun 23, 2024

First CTF Submitted

First CTF Submitted: Caesar Cipher

10:03 AM

Com Olho

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Exploit Development Tools
Hacking Interest
  • Website Apps APIs Databases
Learning Goals
  • Improve Skills Gain certifications Advance Career
Learning Style
  • Reading Hands on labs
Security Focus
  • Offensive Security
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Organization Severity Vulnerability Type Status
Dharampal Satyapal Limited
Max Healthcare
Orient Electric Ltd.
Com Olho
Baazi Games
CK Birla Hospitals
Exam Prep Tool
Maruti Suzuki India Limited
Dish TV
TATA Motors
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully

If you feel like you need any kind of support or assistance, don't hesitate to reach out to us at support@comolho.com . We're here to help!