About Me
I’m Prakhar, internet often know me as Ghost 💀.
I’ve responsibly disclosed my exploitations with organizations including the US Dept. Of Defence, NASA, Google, Netherlands Government, United Nations, Sony, LeetCode, TradingView, Groww, Stanford University, Starbucks and more(Confidential
).
Currently in the way to work with more like them.
Addtionally, I’m Interested in Gaming, Psychology & Philosophy, Mental Health, DarkWeb and more. I occasionally play CTFs on TryHackMe & HackingHub. Sometimes Chess also. So ping me, If you’re interested in collaborating or just want to chat about any of these topics, feel free to reach out!
Track Record …

PII Leak – 1 Million User Records

PII Leak & Account Takeovers
Account Takeover Exploitation

Internal Server Access (SSRF)

Business Logic Exploitation

Information Disclosure

Access Control Exploitation

Information Disclosure
...and more (confidential)
Projects …
1. Xpose - Deanonymization Simulation on DarkWeb Operators
Xpose is a powerful software simulation for performing advanced deanonymization techniques, designed to trace the operators behind illegal dark web sites. The system includes both a web app and CLI (Command Line Interface) to offer flexibility and reliability.
2. TorNet Granted - Enumerating Onion URLs
Python-based web application project for exploring and analyzing the dark web within the TOR (The Onion Router) network. With a focus on threat intelligence and cybersecurity, our software provides a user-friendly interface for discovering, validating & analyzing onion URLs, DOM rendering, Enumerating Onion URLs and scheduling automated tasks init.
Testimonials…
Explore …
Interested in exploring some of my work? Here are a few resources:
- HackerOne Profile: Actual Work.
- GitHub Profile: Explore my Projects, contributions, and repositories.
- My Write-Ups: Read write-ups on some of my interesting Security Research.
- My Blogs: Read some of my blog posts related to psychology & philosophy.
- Contact Me: Feel free to reach out for collaborations or inquiries.