Rahul Jadhav - Profile | Com Olho

Rahul Jadhav

jadhavrahul9872
Last Login: Fri, 22 Nov 2024 14:36:57
Gender: Male
Age: 18-30
Hacking Level: Intermediate
Top 5%
Qualification: Graduation
Status: Employed

Bug Bounty Status Distribution

Vulnerability Types

Journey

Mon, Dec 04, 2023

Joined Community

Joined the community for the first time. Welcome to Com Olho!

02:05 PM

Com Olho

Thu, Jun 06, 2024

First Bug Bounty Report

First Bug Bounty Report: Baazi Games Bug Bounty Program

12:46 PM

Baazi Games

Thu, Jun 06, 2024

First CTF Submitted

First CTF Submitted: QR CODE

02:09 PM

Com Olho

Tue, Jul 09, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: BrandMuscle Bug Hunt Program

03:47 PM

BrandMuscle Inc

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Penetration Testing Frameworks Other
Hacking Interest
  • Website Apps APIs Networks
Learning Goals
  • Improve Skills Gain certifications Advance Career Networking
Learning Style
  • Reading Watching Videos Hands on labs Simulations Webinars Other
Security Focus
  • Offensive Security
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
August 07, 2024 BrandMuscle Bug Hunt Program P4 injection_flaws View Certificate
July 09, 2024 BrandMuscle Bug Hunt Program P4 security_misconfiguration View Certificate
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully