You have exceeded the maximum number of attempts. Please try again later. ×
You have exceeded the maximum number of attempts. Please try again later. ×
You have exceeded the maximum number of attempts. Please try again later. ×
You have exceeded the maximum number of attempts. Please try again later. ×
You have exceeded the maximum number of attempts. Please try again later. ×
Suraj Kumar - Profile | Com Olho

Suraj Kumar

surajvirus3
Rank: 249
Gender: Male
Age: 18-30
Hacking Level: Beginner
Top 5%
Qualification: Undergraduation
Status: Freelancer
Last Login: Wed, 13 Aug 2025 23:29:10

Certificates

See all

Badges

See all

Bug Bounty Status Distribution

Vulnerability Types

Journey

Sat, Jan 25, 2025

Joined Community

Joined the community for the first time. Welcome to Com Olho!

06:34 AM

Com Olho

Sat, Jan 25, 2025

First CTF Submitted

First CTF Submitted: Base64 Decoding

04:18 PM

Com Olho

Tue, Feb 11, 2025

First Bug Bounty Report

First Bug Bounty Report: TATA Motors Security Research Program

02:28 PM

TATA Motors

Tue, Feb 11, 2025

First Rewarded Bug Bounty

First Rewarded Bug Bounty: TATA Motors Security Research Program

02:28 PM

TATA Motors

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Other
Hacking Interest
  • Website Apps APIs Networks Databases Other
Learning Goals
  • Other
Learning Style
  • Other
Security Focus
  • Offensive Security Defensive Security Secure Codes Compliance Threat Intelligence Other
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Organization Severity Vulnerability Type Status
TATA Motors
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully

If you feel like you need any kind of support or assistance, don't hesitate to reach out to us at support@comolho.com . We're here to help!