Skip to Main Content

Job Title


Manual Web Application Exploitation Engineer


Company : Malan Softtech Private Limited


Location : New delhi, Delhi


Created : 2025-05-08


Job Type : Full Time


Job Description

Position Title: Manual Web Application Exploitation Engineer (Codename: WebVenom)Department: Web Breach & Exploit UnitLocation: Remote | Global Offensive RedOpsEmployment Type: Contract-Based | Target-Specific MissionsReports To: Strategic Exploitation StrategistTeam: Member of a 4-Expert Deep Exploitation CellCompany: Malan Softtech – Offensive Security & Penetration EngineeringAbout Malan SofttechMalan Softtech is a specialist cyber exploitation firm focused on deep manual penetration ofhigh-value, high-risk, and cloud-connected web platforms. We don't automate—we infiltrate.Our elite team bypasses protections, extracts impact, and demonstrates control where scannersfail.Role OverviewAs a Manual Web Application Exploitation Engineer, you will manually discover and executecomplex attack chains across web applications, APIs, and token-based authentication systems.Your focus: logical flaws, deep-layer privilege escalations, and zero-footprint exploitation.Core Responsibilities• Execute manual exploitation against real-world web applications — no automatedscanners• Craft blind/time/error-based SQLi payloads without tools• Intercept and manipulate auth/session logic using Burp Suite only• Chain IDORs, CSRFs, and logic flaws to reach admin-level access• Manually fuzz forgotten uploaders, path traversals, and hidden panels• Build end-to-end PoCs via Burp’s Repeater, Intruder, and Sequencer• Coordinate post-breach escalation with internal infrastructure teamRequired Skills• Deep manual experience with Burp Suite (Intruder, Repeater, Sequencer)• SQLi payload crafting across MySQL, PostgreSQL, MSSQL• Mastery in session abuse, token manipulation, and header-based exploits• Familiarity with Host Header Injection, open redirects, SSTI, and accessmisconfigurations• Fluent in breaking obfuscated JavaScript logic and API workflows• Experience with manual admin panel breach through URL fuzzing or chained bypassesBonus Advantage• Experience with race condition exploitation• Manual bypass of JS security challenges (CAPTCHA/redirect logic)• Use of hybrid browser dev tools + Burp for debugging dynamic flowsTactical Mindset• Every redirect is a clue; every response is an angle• Form logic is the weakest point — not form validation• Precision over noise. Manual over automation. Stealth over speedExample Operation"Hidden login panel uses non-standard X-Token-Dev header. You chain session tokens usingBurp, exploit auth bypass, access /admin/report-export, and fuzz input to leak entire user DBvia blind SQLi—without any detection."Execution Model• Fully manual, Burp-based operations only• No scans, no generic reports• Encrypted, scope-locked missions• Works silently with cloud/IP teams for escalationEngagement & Compensation• Encrypted target assignments• Pay-per-success (per exploit chain, not per bug)• Option for long-term confidential retainerHow to ApplySubmit a sample of your best Burp Suite-based exploit chains, including blind SQLi, logicbypasses, or chained auth exploits. Highlight request/response tampering and thought process —screenshots or logs welcome.