[SYSTEM] Initializing system...
[BOOT] Loading core modules
[INIT] Mounting file systems [OK]
[LOAD] Starting network services [OK]
[EXEC] Executing security.sh
[INIT] Initializing user interface [OK]
[DONE] System ready [READY]
Curious about how systems work, break, and can be secured โ built by Shlok
$ ./get_profile.sh
Loading profile info...
Found: Shlok Shah ๐งโ๐ป
Role: IT Student | Aspiring Ethical Hacker
>Mapping attack surfaces, automating hunts, and learning to secure systems.
> Focused on Ethical Hacking & System Security
$ cat contact.txt
Phone: +91 9512345504
$ _|
Hi! I'm Shlok, a cybersecurity and IT student passionate about ethical hacking, Linux, and exploring how systems can be secured and improved.
I focus on learning practical security skills: Kali tools, network scanning, packet analysis, and Python scripting for security tasks. I enjoy breaking things in controlled lab environments so I can learn how to secure them properly.
I'm currently self-learning cybersecurity fundamentals and will be enrolling in a short intensive ethical hacking course soon. I document experiments, small tools, and lab reports.
const developer = {
name: "Shlok",
role: "IT Diploma Student - Exploring Cybersecurity",
location: "Gujarat, India",
interests: [
"Cybersecurity & Ethical Hacking",
"Linux (especially Kali)",
"Python Automation",
"Networking"
],
currentlyLearning: [
"Penetration Testing Fundamentals",
"Web App Security & Vulnerability Scanning"
],
funFact: "I break stuff to learn how to protect it.
Currently experimenting, exploring, and debugging my way through tech."
};
Second Year Diploma in Information Technology at MSU โ focusing on programming, digital systems, and introductory cybersecurity labs.
Personal labs and projects in Kali Linux, network scanning, packet capture, and vulnerability scanning using open-source tools.
The Maharaja Sayajirao University
(MSU), Baroda โ Third Year (Sem 5)
โธ Data Structures ยท C++ OOP
โธ Java ยท Python ยท SQL & DBMS
โธ Operating Systems ยท Software Eng
โบ Security ยท AI ยท Networks
โบ Mobile Dev ยท Cloud Tech
โบ Computer Architecture
Ongoing self-study in Python, Linux, networking, and cybersecurity through labs, tutorials, and short online courses.
Awarded First Prize at Cyberthon 2026, a timed cybersecurity hackathon hosted by The Maharaja Sayajirao University of Baroda , for developing ZeroRisk Sentinel, a hybrid security analysis platform with client-side heuristics and a Python backend. Implemented entropy-based malware detection, YARA rule scanning, VirusTotal reputation checks, SSL/TLS and DNS analysis, APK permission risk scoring, AI-assisted explanations, and resilient fallback mechanisms, evaluated on architecture, accuracy, innovation, and real-world security relevance.
Secured Second Runner-Up at Webgathon 2025, an international online hackathon organized by KISMATI. Built and deployed CyberGuard, a cybersecurity-focused web application evaluated on innovation, technical implementation, user experience, real-world impact, and presentation quality.
Successfully completed the Certified Red Team Operations Management program, focusing on planning, coordinating, and managing red team engagements. Gained insight into red team workflows, operational reporting, assessment management, and aligning offensive security activities with organizational objectives through structured, exam-based evaluation.
Completed 24 hands-on cybersecurity challenges centered around realistic attack and defense scenarios. Gained practical exposure to how malware behaves, how systems can be monitored for suspicious activity, and how common attack techniques are identified and analyzed. The program emphasized daily lab-based learning, problem-solving, and applying core cybersecurity concepts in a structured, real-world context
Advanced, hands-on API security training covering real-world attack workflows. Gained experience in API reconnaissance, endpoint discovery, BOLA/IDOR exploitation, auth bypasses, mass assignment, business logic flaws, rate-limit evasion, and practical API pentesting using tools like Burp Suite, Postman, and Python.
Covered practical Kali Linux operations: file system navigation, privilege escalation basics, Nmap scanning, service enumeration, and working with essential penetration testing tools and lab workflows.
Introduction to Android application security, APK structure, basic analysis concepts, and understanding common mobile vulnerabilities and attack surfaces.
Training in reconnaissance, scanning, enumeration, vulnerability assessment, and simulated attack scenarios using Cisco cybersecurity labs and tools.
Successfully completed the full Web X Web Development Certification Program, covering HTML, CSS, JavaScript, responsive design concepts, and practical project-based learning to build modern web interfaces.
Enrolling soon in a practical bootcamp to strengthen penetration testing and real-world lab skills.
Covered the fundamentals of Git version control, creating commits, pushing changes, basic branching, and using GitHub for repository hosting.
A full-stack threat detection platform combining client-side analysis with a Python Flask backend for advanced security intelligence. Features YARA rule-based malware scanning, VirusTotal API integration for hash reputation checks, Google Safe Browsing and URLHaus threat intelligence, Android APK permission analysis with AndroGuard, AI-powered threat explanations via Groq LLM, and SSL/DNS/WHOIS reconnaissance. Includes real-time file entropy analysis, extension spoofing detection, PE structure validation, multi-format report generation (JSON/PDF), and a cyberpunk UI with Matrix-themed animations. Designed with graceful degradationโcore detection works offline while backend enhances accuracy.
View Code โSwipeClean is an Electron + React desktop app that turns folder cleanup into a Tinder-style swipe arena. Instead of manually sorting files, users review one file card at a time with fast keep/delete/skip actions, smart previews, and live storage impact stats. You can play it mouse-first or go full keyboard mode (A/D/W + arrow keys + Ctrl+Z) for a speedrun-style cleanup flow ๐น๏ธ.
A high-performance cybersecurity intelligence matrix built for fast offensive-security research workflows. CyberForge Atlas unifies payload references, service fingerprinting guides, and exploitation playbooks into a single knowledge base with zero-lag browsing. Designed for restricted or lab-only environments, it works fully offline with a self-contained knowledge base and a scripted ingestion pipeline for continuous expansion.
View Code →An ethical, high-speed asynchronous port scanner that scans all 65,535 ports, identifies services, highlights potential attack risks, and provides clear, actionable security fixes. It includes severity tagging, domain-to-IP resolution, detection of suspicious/malware-related ports, a hacker-themed UI, and one-click PDF security reports for clean and organized auditing.
View Code →ReconMaster v2 is an intelligent Kali Linux reconnaissance framework that unifies 12+ industry-standard tools into one guided workflow for bug bounty hunters and penetration testers. It includes a Deep Recon mode that chains 11 high-value modules end-to-end, covering subdomain discovery, DNS/HTTP probing, URL and parameter discovery, JS endpoint extraction, directory and API fuzzing, subdomain takeover checks, technology fingerprinting, SQLMap-assisted testing, and screenshot capture. Results are organized into structured output folders with progress tracking and actionable summary reporting.
View Code →A cyberpunk password security suite with real-time strength analysis, breach detection, entropy and crack-time calculation, and a 5,000+ weak-password blacklist. Features an AES-256 encrypted vault, Base64 + XOR methods, interactive radar charts, leak detection warnings, full client-side processing, secure local storage for encrypted password history, and intelligent stronger-password suggestions for weak inputs.
View Code →A curated collection of Open Source Intelligence tools for cybersecurity professionals, investigators, and researchers. Features fast search and filtering, category-based navigation, and a responsive cyber-themed UI for quick tool discovery on desktop and mobile. Built with React, TypeScript, Tailwind CSS, and Lucide React icons.
Performed structured web application vulnerability assessments using OWASP ZAP, including automated spidering, passive and active scanning, and alert analysis across multiple severity levels. Reviewed findings, validated risks, and exported detailed HTML reports for documentation, learning, and remediation planning during hands-on security testing practice.
Report →A lightweight AI Discord bot with slash commands for smart replies, AI image generation, memes, jokes, facts, and paragraph writing. Features conversation memory, OpenRouter integration, a meme API, fast responses, and a clean modern UXโperfect for study groups, coding servers, and fun communities.
View Code →An interactive OSINT platform with a real-time Google Dork Generator, email/username/phone recon tools, instant copy buttons, and auto-formatted multi-pattern phone dorks. Includes a complete beginner-friendly OSINT study guide covering recon frameworks, social media intelligence, metadata analysis, dark-web monitoring, and ethical guidelines, all wrapped in a Matrix-styled cyber interface.
View Code →A Python-based keylogger built to demonstrate real-world keystroke logging behavior. Captures every keystroke including special keys and automatically sends detailed logs to a chosen email address at custom intervals. Includes configurable sender credentials, adjustable reporting frequency, and formatted output logs that mirror how professional-grade keyloggers exfiltrate data. Designed for technical exploration, automation testing, and understanding real keylogger functionality.
View Code →Free, open-source end-to-end encrypted messaging where not even the server can read messages. Signal Protocol + X3DH key exchange. Android APK + Web app with zero metadata leakage for journalists, activists, and privacy-conscious users.
Core crypto done, frontend in progressAdvanced Chrome/Edge extension with visual card grid + AI summaries, auto-grouping by domain, focus modes, mouse gestures + voice control. Features panic mode for productivity, Tab DNA graphing, and smart tab suspension.
Core features built, polishing UIFull-stack penetration testing framework with real reconnaissance + vulnerability scanning, adaptive payload generation, and attack chain discovery via Neo4j. FastAPI backend + React frontend with REAL DNS, port, and code injection testing.
Scanner engine scaffolding, DB integration pendingDecryption in progress... Please stand by for authorized release.
Access Denied โEncrypted content. Authorization key required to continue.
Request Access โ