Specializing in Red Teaming, Adversary Simulation, and Vulnerability Assessments.
Protecting the unseen.
ACKNOWLEDGED BY SECURITY TEAMS AT
Bounties Earned
Vulnerabilities Reported
Critical CVEs/P1s
Custom Tools Built
I am an Offensive Security Researcher and Red Team Lead specialized in uncovering critical vulnerabilities across web applications, APIs, and enterprise infrastructure. With a manual-first approach, I focus on realistic adversary simulation, advanced attack chaining, and business-impact-driven exploitation—prioritizing signal over surface-level noise.
Beyond bug bounty hunting on HackerOne and Bugcrowd, I build custom Python-based offensive frameworks to scale reconnaissance while maintaining precision. My experience extends to assisting law enforcement with digital investigations, bridging the gap between offensive techniques and forensic analysis.
Currently, I lead red team operations and mentor junior researchers, driven by a goal to defend organizations by thinking like the most advanced attackers in the world.
CyberAries Pvt. Ltd.
HackerOne & Bugcrowd
Mumbai Police
**Wayback Secret Finder**. Extracts URLs from Wayback Machine and scans for exposed secrets (API keys, tokens, credentials). Multi-threaded for speed.
**JavaScript Extractor**. Extracts JS files from target domains to help identify exposed API endpoints and client-side vulnerabilities.
**403 Bypass Toolkit**. Automates bypass techniques using header manipulation, path normalization, and encoding tricks to access restricted endpoints.
Custom XSS scanners, focused subdomain recon pipelines, and API fuzzing frameworks used internally for bug bounty hunting and red teaming.
Upcoming hackathon project details will be updated here. Innovative security solution in progress.
Space reserved for future hackathon achievement. Solution architecture and stack to be announced.
Web App PenTester eXtreme
Certified Professional PenTester
Junior Penetration Tester
Certified Ethical Hacker
Purple Team Analyst
Target: OSCP/OSEP
[IN PROGRESS]Target: CRTO/CRTP
[PLANNED]Target: BSCP/CPTS/CBBH
[GOAL]root@shivang:~/skills# cat detailed_arsenal.txt