$ cat /etc/kalp/profile
Role : Offensive security researcher & bug bounty hunter
Focus : Web app pentesting, cloud misconfigs, OAuth/JWT, race conditions
Building : Akira - the AI pentest co-pilot that actually finds bugs
Based : India
CVEs : Strapi SSRF bypass + MIME fail-open (filed 2026)
Bounties : HackerOne, Bugcrowd, private programsAkira - AI Pentest Co-Pilot
Phase-chained offensive security skills for Claude Code, Gemini CLI, Cursor, and Codex. No hallucinated findings. Every result is evidence-gated.
/plan-engagement -> /recon -> /secrets -> /exploit -> /triage -> /report
12 attack modules. Real bug bounty findings updated weekly. MIT licensed.
EvilTwin with ESP32 - Hardware Attack Demo
Compact Wi-Fi spoofing simulation on ESP32 with LED display. Built for ethical hacking demos and cybersecurity awareness.
| Finding | Severity | Platform | Bounty |
|---|---|---|---|
| SSRF -> AWS IAM credential extraction | Critical | HackerOne | $2,500 |
| OAuth open redirect -> ATO chain | Critical | Bugcrowd | $1,800 |
| JWT RS256->HS256 algorithm confusion -> admin | Critical | HackerOne | $1,500 |
| Race condition: coupon applied 7x simultaneously | High | Private | $800 |
| Strapi SSRF bypass + MIME fail-open | Critical | CVE filed | - |
Full writeups in Akira/FINDINGS.md
Building tools that find real bugs. If Akira helped you, star it or buy me a coffee.