> sudo ./launch portfolio -- hackerazmi

HackerAzmi

Ethical Hacker & Bug Hunter
I find and fix the holes others miss.

0
Projects
0
Companies Secured
0
Certificates
0
Years Experience

About Me

> whoami

Student of BTech at Integral University, passionate about cybersecurity and ethical hacking. I specialize in finding vulnerabilities before malicious actors do, helping organizations strengthen their digital defenses.

As a bug bounty hunter, I've helped secure numerous companies and discovered critical vulnerabilities that could have led to significant data breaches.

Skills & Technologies

Programming Languages

C C++ Python Bash JavaScript

Web Technologies

HTML CSS JavaScript SQL

Security Tools

Burp Suite OWASP ZAP Nmap Metasploit

Cloud & DevOps

AWS Docker Kubernetes Linux

Experience Timeline

Bug Bounty Hunter

2022 - Present

Successfully discovered and reported vulnerabilities across multiple platforms, earning recognition from various organizations like Acer, HP, Lenevo, Ahaguru, mamaearth etc 20+

Cybersecurity Intern

2024 - 2025

Conducted penetration testing and vulnerability assessments for various clients, improving their security posture.

BTech Student

2024 - Present

Pursuing Bachelor of Technology at Integral University with focus on cybersecurity and ethical hacking.

Services

> services --list
🔒

Penetration Testing

Comprehensive security assessments to identify vulnerabilities in your systems before attackers do.

Burp Suite OWASP ZAP Nmap
🎯

Bug Bounty

Professional bug hunting services to help organizations identify and fix security vulnerabilities.

Manual Testing Automation Reporting
🌐

Web App Security

Specialized security testing for web applications, APIs, and modern web technologies.

OWASP Top 10 API Testing XSS/SQLi
☁️

Cloud Security

Security assessments for cloud infrastructure, configurations, and deployment pipelines.

AWS Azure GCP
📝

Secure Code Review

Thorough code analysis to identify security vulnerabilities and provide remediation guidance.

Static Analysis Code Review Best Practices
🎨

3D/UX Design

Modern web design with 3D elements and exceptional user experience for security-focused applications.

Three.js GSAP WebGL

Projects

> ls projects/
Web Security Scanner

Web Security Scanner

Automated web application security scanner with custom payloads and reporting.

Python Requests BeautifulSoup
View Source
Buffer Overflow Exploit

Buffer Overflow Exploit

Custom buffer overflow exploit development for educational purposes.

C Assembly GDB
View Source
CTF Writeups

CTF Writeups

Collection of Capture The Flag challenge solutions and methodologies.

Python Bash Crypto
View Source
Bug Bounty Tools

Bug Bounty Tools

Custom tools and scripts for efficient bug bounty hunting and reconnaissance.

Python Go Bash
View Source
Security Automation

Security Automation

Automated security testing pipelines and CI/CD integration tools.

Python Docker GitHub Actions
View Source
Portfolio Website

Portfolio Website

This very website - showcasing modern web development with 3D elements.

HTML CSS JavaScript Three.js
View Source

Certificates

> certificates

Network Defense Essentials

EC-Council

2023

Fundamentals of network security and defense strategies.

Incident Response

EC-Council

2023

Incident handling and response methodologies.

TryHackMe

TryHackMe

2022-2023

Multiple cybersecurity learning paths completed.

Hack The Box

Hack The Box

2022-2023

Penetration testing challenges and CTF competitions.

AWS Security

Amazon Web Services

2023

Cloud security fundamentals and best practices.

Threat Intelligence & Governance Analyst

RED TEAM LEADERS

2026

Threat Intelligence & Governance Analyst

Verify

ISO/IEC 27001:2022 Lead Auditor

Mastermind

2026

Cloud security fundamentals and best practices.

Certified Red Team Operations Management

Red Team Leaders

2023

Cloud security fundamentals and best practices.

OWASP Top 10

OWASP Foundation

2024

Web application security vulnerabilities and mitigation.

Responsible Disclosure

Integral University

Reported Backend Api Leak i use to host a fake website with using the backend api and interact with original site .

High Acknowledged

Student Senior

Reported XSS vulnerability via Profile Picture

High Certificate

Student Senior

Reported IDOR vulnerability in JWT Json Token.

High Acknowledged

Student Senior

Reported BOLA vulnerability Via Reusable Access Token.

High Acknowledged

Student Senior

Reported HTML Injection vulnerability in login Panel.

Medium Acknowledged

Student Senior

CORSP vulnerability in Api.

Medium Thank You Response

Ahaguru

Reported IDOR vulnerability in Student Dashboard.

High $50 Bounty

Unistra

Reported Open Ftp Port vulnerability.

High Acknowledged

Hp

Reported XSS vulnerability Via Unsanitized Request.Path in Accessibility.

High Acknowledged

Acer

Reported HTML Injection vulnerability in Name Section.

Medium Hall of Fame

Thinkfic

Reported HTML Injection vulnerability in Name Section.

Medium Thanks For Reporting

Mamaearth

Reported Api Token Leak .

High Acknowledged

Mamaearth

RCE remote code exicution Via Profile Picture.

High Nothing

Mamaearth

Reported Subdomain Takeover .

High Acknowledged

Contact

> contact --init

Get In Touch

Ready to secure your systems? Let's discuss your security needs.

💼

LinkedIn

linkedin.com
🐙