[SYSTEM] Initializing system...

[BOOT] Loading core modules

[INIT] Mounting file systems [OK]

[LOAD] Starting network services [OK]

[EXEC] Executing security.sh

[INIT] Initializing user interface [OK]

[DONE] System ready [READY]

// IT Student | Exploring Cybersecurity & Ethical Hacking

> Shlok Shah (shlok)

Curious about how systems work, break, and can be secured โ€” built by Shlok

$ ./get_profile.sh

Loading profile info...

Found: Shlok Shah ๐Ÿง‘โ€๐Ÿ’ป

Role: IT Student | Aspiring Ethical Hacker

>Mapping attack surfaces, automating hunts, and learning to secure systems.

> Focused on Ethical Hacking & System Security


$ cat contact.txt

Phone: +91 9512345504


$ _|

About Me

Hi! I'm Shlok, a cybersecurity and IT student passionate about ethical hacking, Linux, and exploring how systems can be secured and improved.

I focus on learning practical security skills: Kali tools, network scanning, packet analysis, and Python scripting for security tasks. I enjoy breaking things in controlled lab environments so I can learn how to secure them properly.

I'm currently self-learning cybersecurity fundamentals and will be enrolling in a short intensive ethical hacking course soon. I document experiments, small tools, and lab reports.

1+
Years learning
5+
Hands-on labs
โˆž
Curiosity
about.js
const developer = {
                        name: "Shlok",
  role: "IT Diploma Student - Exploring Cybersecurity",
  location: "Gujarat, India",
  interests: [
    "Cybersecurity & Ethical Hacking",
    "Linux (especially Kali)",
    "Python Automation",
    "Networking"
  ],
  currentlyLearning: [
    "Penetration Testing Fundamentals",
    "Web App Security & Vulnerability Scanning"
  ],
    funFact: "I break stuff to learn how to protect it. 
Currently experimenting, exploring, and debugging my way through tech."
};

Skills

Core Programming & Systems

C / C++ / WEB 90%
Python 70%
Kali Linux 65%

Cybersecurity & Networking

Networking Basics / Protocols 69%
Wireshark / Packet Analysis 65%
OWASP ZAP / Web Scanning 60%

Tools & Environment

Python Scripting / Automation 83%
Git/GitHub (Version Control) 85%
Virtualization (VMware / VirtualBox) 90%

Experience

IT Diploma Student

2024 - Present

Second Year Diploma in Information Technology at MSU โ€” focusing on programming, digital systems, and introductory cybersecurity labs.

Self-guided Security Labs

2024 - Present

Personal labs and projects in Kali Linux, network scanning, packet capture, and vulnerability scanning using open-source tools.

Education

Diploma in Information Technology

2024 - 2027 (Expected)

The Maharaja Sayajirao University
(MSU), Baroda โ€” Third Year (Sem 5)

โ–ธ Data Structures ยท C++ OOP
โ–ธ Java ยท Python ยท SQL & DBMS
โ–ธ Operating Systems ยท Software Eng

โ–บ Security ยท AI ยท Networks
โ–บ Mobile Dev ยท Cloud Tech
โ–บ Computer Architecture

Self-Learning & Online Courses

2024 - Present

Ongoing self-study in Python, Linux, networking, and cybersecurity through labs, tutorials, and short online courses.

Certifications & Awards

๐Ÿฅ‡
Cyberthon 2026
MSU Baroda

First Prize โ€” Cyberthon 2026

Awarded First Prize at Cyberthon 2026, a timed cybersecurity hackathon hosted by The Maharaja Sayajirao University of Baroda , for developing ZeroRisk Sentinel, a hybrid security analysis platform with client-side heuristics and a Python backend. Implemented entropy-based malware detection, YARA rule scanning, VirusTotal reputation checks, SSL/TLS and DNS analysis, APK permission risk scoring, AI-assisted explanations, and resilient fallback mechanisms, evaluated on architecture, accuracy, innovation, and real-world security relevance.

๐Ÿ†
Webgathon 2025
KISMATI

Second Runner-Up โ€” Webgathon 2025

Secured Second Runner-Up at Webgathon 2025, an international online hackathon organized by KISMATI. Built and deployed CyberGuard, a cybersecurity-focused web application evaluated on innovation, technical implementation, user experience, real-world impact, and presentation quality.

๐ŸŽฏ
CRTOM
Red Team Leaders

Certified Red Team Operations Management

Successfully completed the Certified Red Team Operations Management program, focusing on planning, coordinating, and managing red team engagements. Gained insight into red team workflows, operational reporting, assessment management, and aligning offensive security activities with organizational objectives through structured, exam-based evaluation.

๐ŸŽ„
Advent of Cyber 2025
TryHackMe

Advent of Cyber 2025 โ€” Cybersecurity Challenges

Completed 24 hands-on cybersecurity challenges centered around realistic attack and defense scenarios. Gained practical exposure to how malware behaves, how systems can be monitored for suspicious activity, and how common attack techniques are identified and analyzed. The program emphasized daily lab-based learning, problem-solving, and applying core cybersecurity concepts in a structured, real-world context

๐Ÿ›ก๏ธ
API Hacking Expert
CAPIE Program

CAPIE โ€“ Certified API Hacking Expert

Advanced, hands-on API security training covering real-world attack workflows. Gained experience in API reconnaissance, endpoint discovery, BOLA/IDOR exploitation, auth bypasses, mass assignment, business logic flaws, rate-limit evasion, and practical API pentesting using tools like Burp Suite, Postman, and Python.

๐Ÿง
Kali Linux
Cyber Mind Space

Kali Linux Masterclass

Covered practical Kali Linux operations: file system navigation, privilege escalation basics, Nmap scanning, service enumeration, and working with essential penetration testing tools and lab workflows.

๐Ÿ“ฑ
Android Security
Cyber Mind Space

Android Hacking Masterclass

Introduction to Android application security, APK structure, basic analysis concepts, and understanding common mobile vulnerabilities and attack surfaces.

๐ŸŽ“
Ethical Hacker
Cisco Networking Academy

Cisco Ethical Hacker

Training in reconnaissance, scanning, enumeration, vulnerability assessment, and simulated attack scenarios using Cisco cybersecurity labs and tools.

๐Ÿ…
Web Development
Web X

Full Web Development Certification

Successfully completed the full Web X Web Development Certification Program, covering HTML, CSS, JavaScript, responsive design concepts, and practical project-based learning to build modern web interfaces.

โšก
Ethical Hacking
Paid short course

Ethical Hacking โ€” Intensive (45โ€“60 days)

Enrolling soon in a practical bootcamp to strengthen penetration testing and real-world lab skills.

</>
Git & GitHub
WsCube Tech

Git & GitHub Essentials

Covered the fundamentals of Git version control, creating commits, pushing changes, basic branching, and using GitHub for repository hosting.

Featured Projects

ZeroRisk Sentinel โ€” Hybrid Cybersecurity Analysis Platform ๐Ÿ›ก๏ธ

A full-stack threat detection platform combining client-side analysis with a Python Flask backend for advanced security intelligence. Features YARA rule-based malware scanning, VirusTotal API integration for hash reputation checks, Google Safe Browsing and URLHaus threat intelligence, Android APK permission analysis with AndroGuard, AI-powered threat explanations via Groq LLM, and SSL/DNS/WHOIS reconnaissance. Includes real-time file entropy analysis, extension spoofing detection, PE structure validation, multi-format report generation (JSON/PDF), and a cyberpunk UI with Matrix-themed animations. Designed with graceful degradationโ€”core detection works offline while backend enhances accuracy.

View Code โ†’

CyberForge Atlas โ€” Offensive Intelligence Hub ๐Ÿ›ฐ๏ธ

A high-performance cybersecurity intelligence matrix built for fast offensive-security research workflows. CyberForge Atlas unifies payload references, service fingerprinting guides, and exploitation playbooks into a single knowledge base with zero-lag browsing. Designed for restricted or lab-only environments, it works fully offline with a self-contained knowledge base and a scripted ingestion pipeline for continuous expansion.

View Code →

Open-Port Reaper (Port Scanner)

An ethical, high-speed asynchronous port scanner that scans all 65,535 ports, identifies services, highlights potential attack risks, and provides clear, actionable security fixes. It includes severity tagging, domain-to-IP resolution, detection of suspicious/malware-related ports, a hacker-themed UI, and one-click PDF security reports for clean and organized auditing.

View Code →

ReconMaster v2 - Professional Reconnaissance Framework for Bug Bounty & Pentesting

ReconMaster v2 is an intelligent Kali Linux reconnaissance framework that unifies 12+ industry-standard tools into one guided workflow for bug bounty hunters and penetration testers. It includes a Deep Recon mode that chains 11 high-value modules end-to-end, covering subdomain discovery, DNS/HTTP probing, URL and parameter discovery, JS endpoint extraction, directory and API fuzzing, subdomain takeover checks, technology fingerprinting, SQLMap-assisted testing, and screenshot capture. Results are organized into structured output folders with progress tracking and actionable summary reporting.

View Code →

CyberGuard โ€” Webgathon 2025 Runner-Up ๐Ÿ†

A cyberpunk password security suite with real-time strength analysis, breach detection, entropy and crack-time calculation, and a 5,000+ weak-password blacklist. Features an AES-256 encrypted vault, Base64 + XOR methods, interactive radar charts, leak detection warnings, full client-side processing, secure local storage for encrypted password history, and intelligent stronger-password suggestions for weak inputs.

View Code →

OSINT Tools Directory โ€” Curated Intelligence Toolkit ๐Ÿ”

A curated collection of Open Source Intelligence tools for cybersecurity professionals, investigators, and researchers. Features fast search and filtering, category-based navigation, and a responsive cyber-themed UI for quick tool discovery on desktop and mobile. Built with React, TypeScript, Tailwind CSS, and Lucide React icons.

OWASP ZAP - Lab Scan

Performed structured web application vulnerability assessments using OWASP ZAP, including automated spidering, passive and active scanning, and alert analysis across multiple severity levels. Reviewed findings, validated risks, and exported detailed HTML reports for documentation, learning, and remediation planning during hands-on security testing practice.

Report →

AskMeBot - A Smart, Free AI Assistant for Discord

A lightweight AI Discord bot with slash commands for smart replies, AI image generation, memes, jokes, facts, and paragraph writing. Features conversation memory, OpenRouter integration, a meme API, fast responses, and a clean modern UXโ€”perfect for study groups, coding servers, and fun communities.

View Code →

OSINT Academy - Cyber-Themed Open Source Intelligence Learning Platform

An interactive OSINT platform with a real-time Google Dork Generator, email/username/phone recon tools, instant copy buttons, and auto-formatted multi-pattern phone dorks. Includes a complete beginner-friendly OSINT study guide covering recon frameworks, social media intelligence, metadata analysis, dark-web monitoring, and ethical guidelines, all wrapped in a Matrix-styled cyber interface.

View Code →

Python Keylogger โ€” Automated Keystroke Capture & Email Log Delivery

A Python-based keylogger built to demonstrate real-world keystroke logging behavior. Captures every keystroke including special keys and automatically sends detailed logs to a chosen email address at custom intervals. Includes configurable sender credentials, adjustable reporting frequency, and formatted output logs that mirror how professional-grade keyloggers exfiltrate data. Designed for technical exploration, automation testing, and understanding real keylogger functionality.

View Code →

Currently Working On ๐Ÿ”ง

WIP

GHOST โ€” Zero-Knowledge Encrypted Messenger ๐Ÿ‘ป

Free, open-source end-to-end encrypted messaging where not even the server can read messages. Signal Protocol + X3DH key exchange. Android APK + Web app with zero metadata leakage for journalists, activists, and privacy-conscious users.

Core crypto done, frontend in progress
WIP

TabMaster Pro โ€” Ultimate Tab Manager Extension ๐ŸŽฏ

Advanced Chrome/Edge extension with visual card grid + AI summaries, auto-grouping by domain, focus modes, mouse gestures + voice control. Features panic mode for productivity, Tab DNA graphing, and smart tab suspension.

Core features built, polishing UI
WIP

CHIMERA โ€” AI-Powered Adaptive Red Team Framework ๐Ÿ‰

Full-stack penetration testing framework with real reconnaissance + vulnerability scanning, adaptive payload generation, and attack chain discovery via Neo4j. FastAPI backend + React frontend with REAL DNS, port, and code injection testing.

Scanner engine scaffolding, DB integration pending

Latest Blog Posts

[ACCESS PENDING]

Entry Locked โ€” Access Restricted

- - -

Decryption in progress... Please stand by for authorized release.

Access Denied โ†’
[SYSTEM LOG 02]

Transmission Incomplete

- - -

Data corruption detected โ€” attempting to recover fragments...

Retry โ†’
[LOG 03: ENCRYPTED]

File Secured โ€” Unauthorized Access

- - -

Encrypted content. Authorization key required to continue.

Request Access โ†’

Get In Touch

๐Ÿ“ง

Email

shlokshah412@gmail.com
preferred contact: Email
๐Ÿ’ผ

GitHub

github.com/shlokkokk