AuditWave Security — Web Penetration Testing
  • Skills
  • Journey
  • Vulns
  • Hall of Fame
  • Certs
  • Security Packages
  • Contact
Available for Bug Bounty & Pentest Engagements

KHALID
SANAWER

I find vulnerabilities before the bad guys do. Specialising in deep target enumeration, manual-first methodology, and responsible disclosure — with acknowledged reports across multiple platforms and programmes.

Reported to Airbnb, Dyson, Inditex, Freshworks, Magic Eden and 1,200+ other targets.

View Vulnerabilities→ Hire Me
0+
Targets Tested
0+
Years Active
0%
Manual Testing
0+
Global Brands
01 — Expertise

SKILLS &
METHODOLOGY

TARGET ENUMERATION

Deep, in-depth reconnaissance — subdomain discovery, port scanning, technology fingerprinting, attack surface mapping, and asset correlation before touching a single endpoint.

Subdomain EnumOSINTAttack SurfaceFingerprinting

WEB APPLICATION TESTING

Comprehensive manual testing covering OWASP Top 10 and beyond — XSS, SQLi, IDOR, SSRF, XXE, auth bypass, business logic flaws, and more.

XSSSQLiIDORSSRFAuth Bypass

TOOLING

Strategic use of industry-standard tools to support manual findings. Tools amplify, they don't replace — used for efficiency, not as a crutch.

Burp SuiteNmapffufAmassNuclei

REPORTING & DISCLOSURE

Clear, professional vulnerability reports with full PoC, impact analysis, and remediation steps. Responsible disclosure to every affected organisation.

PoC WritingCVSS ScoringResponsible Disclosure

// Testing Methodology Split

Manual Testing — intuition, logic, creativity0%
Automated Scanning — speed, coverage verification0%
02 — Journey

FROM 2022
TO NOW

2022 — The Beginning
STARTED WEB SECURITY

Started learning web application security from scratch. Began with OWASP Top 10, basic HTTP concepts, and setting up Burp Suite. First steps into the hacker mindset.

OWASP Top 10Burp SuiteHTTP Basics
2022 — First Practice
LAB PRACTICE & CTFs

Practiced on PortSwigger Web Security Academy labs — XSS, SQLi, CSRF, SSRF, XXE. Built hands-on skills through structured challenges before moving to real targets.

XSS LabsSQLi LabsPortSwiggerCTF
2023 — First Real Bug
FIRST REAL VULNERABILITY FOUND

Reported first real security vulnerability to a live target through responsible disclosure. The company acknowledged the issue — a milestone moment that confirmed this was the right path.

Responsible DisclosureAcknowledged ✓Real Target
Jan 2024 — Recognition
MATHIAS AHLGREN ACKNOWLEDGEMENT

Security issue reported and personally acknowledged by Mathias Ahlgren. Validated the quality and professionalism of the disclosure process and reporting skills.

Hall of Fame ✓Direct Disclosure
Oct 2024 — Company Recognition
TOMORROW WEB DESIGN HOF

Reported critical security issue to Tomorrow Web Design. Founder Tansu Cabaci personally responded, confirming steps were taken to remediate the vulnerability.

Hall of Fame ✓Tomorrow Web Design
2024 — Certification
EC-COUNCIL CERTIFICATION EARNED

Completed EC-Council's Practical Bug Bounty Hunting for Hackers and Pentesters — formalising expertise in bug bounty methodology, tools, and professional reporting standards.

EC-Council ✓Bug BountyPentest
2025–2026 — Active Now
HACKERONE & BUGCROWD ACTIVE

Active bug bounty hunter on HackerOne and Bugcrowd. Continuously expanding scope, refining methodology, and hunting across public and private programmes worldwide.

HackerOneBugcrowdActive Now 🟢
03 — Findings

REPORTED
VULNERABILITIES

⬥ High
Blind SSRF via Open Redirect Parameter

Target: Airbnb — Exploited an open redirect to reach internal metadata services, potentially exposing cloud credentials.

ReportedHackerOne
⬥ High
Business Logic Bypass — Client-Side Response Tampering

Target: Inditex (Pull & Bear) — Manipulated server response on the client-side to spoof successful payment confirmation.

ReportedHackerOne
⬥ High
Session Impersonation via Full Cookie Replacement

Target: Dyson — Identified a vulnerability allowing for complete session takeover by replacing authentication cookies.

ReportedHackerOne
⬥ High
IDOR on Agent Profile Edit

Target: Freshworks — Insecure Direct Object Reference allowed editing and returning sensitive data of other agent profiles.

ReportedHackerOne
⬥ High
Subdomain Takeover via OneSignal

Target: Magic Eden — Successfully identified and claimed a subdomain vulnerable to takeover via misconfigured OneSignal settings.

ReportedHackerOne
⬥ High
WordPress Admin/Users Disclosure

Target: Arkose Labs — Information disclosure vulnerability exposing WordPress administrative details and user lists.

ReportedHackerOne
04 — Recognition

HALL OF
FAME

N
Nick
Saturday, Mar 8 · 1:32 AM

"Just realised I totally forgot to implement it on these domains. Thank you for the heads up. Really nice and appreciated of you."

Security Issue Acknowledged
MA
Mathias Ahlgren
Sunday, Jan 28, 2024 · 2:49 PM

"Thanks, I appreciate the heads up!"

Responsible Disclosure
TC
Tansu Cabaci
Monday, Oct 21, 2024 · 8:02 AM

"Thank you for pointing out the security issue on our website. We appreciate your input and are taking steps to correct the problem."

Tomorrow Web Design — Founder
05 — Certification

CREDENTIALS

EC-Council · Continuing Education
Practical Bug Bounty Hunting for Hackers & Pentesters
Awarded to: Khalid Sanawer  ·  Validation of Course Completion
06 — Active On

BUG BOUNTY
PLATFORMS

HackerOne
HackerOne
Triaged reports & responsible disclosure
Bugcrowd
Bugcrowd
Vulnerability submissions & programme participation
07 — Get In Touch

LET'S WORK
TOGETHER

Need a penetration test, security audit, or bug bounty collaboration? I bring thoroughness, professionalism, and a hacker's eye to every engagement.

Send a Message

© 2026 Khalid Sanawer  ·  Web Penetration Tester

Built with & security in mind