Cipher Shadow - Profile | Com Olho

Cipher Shadow

shadowuser
Last Login: Sun, 24 Nov 2024 23:17:13
Gender: Male
Age: 18-30
Hacking Level: Beginner
Top 1%
Qualification: Undergraduation
Status: Employed

Bug Bounty Status Distribution

Vulnerability Types

Journey

Sat, Aug 26, 2023

Joined Community

Joined the community for the first time. Welcome to Com Olho!

05:42 PM

Com Olho

Thu, Nov 02, 2023

First CTF Submitted

First CTF Submitted: One-Time Pad Encryption

06:27 PM

Com Olho

Thu, Jan 18, 2024

First Coordinated Program Submission

First Coordinated Program Submission

04:24 PM

zyduslife.com

Wed, Jun 05, 2024

First Bug Bounty Report

First Bug Bounty Report: Com Olho Security Research Reward Program

03:40 PM

Com Olho

Tue, Jul 23, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: Com Olho Security Research Reward Program

09:06 PM

Com Olho

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Network Analysis Tools Exploit Development Tools
Hacking Interest
  • Website Apps APIs Networks Databases Other
Learning Goals
  • Stay Updated Other
Learning Style
  • Reading Watching Videos Hands on labs Simulations Webinars Other
Security Focus
  • Offensive Security Defensive Security Threat Intelligence
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
September 16, 2024 Tata Motors Bug Bounty Program P4 dos_attack Vulnerability Closed
August 01, 2024 Com Olho Security Research Reward Program P2 other View Certificate
July 23, 2024 Com Olho Security Research Reward Program P5 other Vulnerability Closed
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully
Coordinated Submissions

This graph shows the status of coordinated submissions (Accepted/Rejected).

Coordinated Submissions