IP: Loading...
Location: Loading...
Time: Loading...
Date: Loading...
Akash Ghosh

Akash Ghosh

@myselfakash20

Cybersecurity Expert | Bug Bounty Hunter | Security Researcher

Helping organizations strengthen their digital defenses through ethical hacking and security research.

About Me

Hi, I'm Akash Ghosh, a full-time cybersecurity researcher and bug bounty hunter since 2022. I specialize in uncovering vulnerabilities, securing web applications, and mentoring aspiring hackers.

My focus areas include advanced vulnerability discovery, web & API security, and strategic security research that delivers measurable impact.

Recon & OSINT

Advanced reconnaissance and open-source intelligence gathering

Vulnerability Research

Finding and exploiting security flaws in web applications

Web Security

OWASP Top 10, API Security, and advanced attack vectors

Mentorship

Sharing knowledge and guiding newcomers in cybersecurity

Skills & Expertise

Pentesting

Recon & OSINT Automation
Web App Security (OWASP Top 10)
API Testing & Logic Flaws
Advanced Recon & Asset Discovery
JS File Analysis & Parameter Fuzzing
Dorking & Search Engine Recon

Programming Languages

Bash Scripting
Python
JavaScript
HTML/CSS
SQL
Java

Tools & Technologies

Recon & OSINT

Amass
theHarvester
Subfinder / Assetfinder
Shodan / Censys
FOFA / ZoomEye
GitHub Dorking

Web Testing

Burp Suite Pro
ZAP (OWASP)
Postman / Insomnia
Dirsearch / Feroxbuster
SQLMap / XSStrike
Nmap / Masscan

Automation

Nuclei
GF Patterns
Waybackurls / gau
QSReplace / Uro
MassDNS / dnsx
ffuf / x8

Latest Insights

I regularly publish educational writeups, bug bounty reports, and security research insights to share knowledge with the community.

Bug Bounty Tips

Advanced Recon Techniques

Discovering hidden assets and subdomains that others miss in bug bounty programs.

Read More
Web Security

API Security Testing

Methodologies for finding vulnerabilities in modern REST and GraphQL APIs.

Read More
Tools & Automation

Building a Recon Workflow

How to automate your reconnaissance process for efficient bug hunting.

Read More
View All Posts

Hall of Fame

Recognized by these organizations for security research contributions

Get In Touch

I'm open to collaborations, private bug bounty programs, security research partnerships, and mentorship opportunities.

Email

Contact for professional inquiries

Twitter/X

Follow for security insights

LinkedIn

Professional network

GitHub

Open-source projects & tools