Shubham
Chaskar

Hacker

Programmer

Mentor

Hello,

I'm Shubham, a Cyber Security Enthusiast from India. I have a rich experience in pen-testing, also I write small utilities that help me and others while hacking.

Contact Me

About Me

My story

I work at ArisGlobal as an Application Security Engineer and an independent security researcher @bugcrowd @hackerone and @intigriti. In the past, I worked as a freelancer and helped companies to secure their assets. I enjoy hacking on Web Applications, Android Applications, IOS applications, and APIs. I'm also well versed with Secure Code Analysis, Vulnerability Assessment, and Network Penetration Testing. I also have quite some experience in malware analysis and in Cyber-threat Intelligence. I'm all ears if you are talking about Cricket.

  • Age: 24
  • Residence: India
  • Freelance: Available
  • Address: Maharashtra
  • E-mail: [email protected]

Services

What I Do
Network PT

Penetration tests are designed to go above and beyond a vulnerability assessment by performing a simulation of the same scenario a hacker would use to penetrate a network.

Web Application
PT

Web application penetration testing is comprised of the following main steps including information gathering, research, exploitation and reporting.

Android Application
PT

It involves decompiling, real-time analysing and testing android application for security point of view.

Secure Code
Review

It is the process of auditing the source code of an application to verify that the proper security and logical controls are present, that they work as intended,

Experience

3+ years

Education

Studied at

Hacking Skills

Creative ability
  • Vulnerability Assessment

    Process of identifying, quantifying, and prioritising the vulnerabilities in a system.

    90%
  • Penetration Testing

    is an authorised simulated cyber-attack on a computer system, performed to evaluate the security of the system.

    90%
  • Secure Code Review

    A secure code review is a specialised task involving manual and/or automated review of an application's source code in an attempt to identify security-related weaknesses (flaws) in the code

    70%
  • OSINT

    Open-source intelligence is a multi-methods methodology for collecting, analysing and making decisions about data accessible in publicly available sources to be used in an intelligence context.

    80%
  • Malware Analysis

    Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL. The output of the analysis aids in the detection and mitigation of the potential threat.

    30%
  • Cyber Threat intelligence

    Cyber threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web.

    70%

Coding Skills

Developing on
  • Python
    80%
  • Go
    70%
  • PHP, MYSQL
    60%
  • JavaScript
    40%
  • HTML, CSS
    75%
  • .NET
    30%
  • Java
    Enter description
    60%

Testimonials

What they say

Certifications

For HR

Portfolio

Latest rewards
Image
GovTech
Image
Vimeo
Image
Alef
Image
Showmax
Image
Ford
Image
HP

Contact

Let's talk

    Full name *

    Email address *

    Message *

    Shubham Chaskar
    Hacker & Mentor
    • Age: 24
    • Residence: India
    • Freelance: Available
    • Address: Maharashtra
    • E-mail: [email protected]
    Shubham Chaskar