Yajnesh K - Profile | Com Olho

Yajnesh K

www.yajnesh302
Last Login: Mon, 12 Aug 2024 16:31:37
Gender: Male
Age: 18-30
Hacking Level: Beginner
Top 5%
Qualification: Undergraduation
Status: Freelancer

Badges

See all

Bug Bounty Status Distribution

Vulnerability Types

Journey

Mon, May 13, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

04:40 PM

Com Olho

Wed, May 22, 2024

First Bug Bounty Report

First Bug Bounty Report: QuickReel's Bounty Programme

10:36 AM

QuickReel

Wed, May 22, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: QuickReel's Bounty Programme

10:36 AM

QuickReel

Sat, Aug 10, 2024

First CTF Submitted

First CTF Submitted: Caesar Cipher

06:17 PM

Com Olho

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Exploit Development Tools Other
Hacking Interest
  • Website
Learning Goals
  • Improve Skills Advance Career
Learning Style
  • Reading Watching Videos Hands on labs Simulations Other
Security Focus
  • Offensive Security
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
May 23, 2024 QuickReel's Bounty Programme P5 broken_access_control Rewarded
May 22, 2024 QuickReel's Bounty Programme P4 insecure_direct_object_references Rewarded
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully