> Cybersecurity Portfolio

Site logoShubham Singh_

@cybersky

Cybersecurity student building offensive and defensive projects with a practical, privacy-first mindset.

Hands-on in web application pentesting, CTFs, attack-defense simulations, and detection fundamentals. I am looking for internship opportunities where I can contribute and keep shipping real security work.

Download Resume

Status Board

FocusOffense + Defense
ProjectsPrivacy-first tools
GoalSecurity Internship

What I bring

Practical security projects, clear write-ups, and internship-ready offensive and defensive workflows that show how I think, test, and communicate.

$ cat profile.md

About Me

Cybersecurity student with hands-on experience across red and blue teaming, including web application penetration testing, CTFs, attack simulation, and detection fundamentals. Skilled in reconnaissance, exploitation, OWASP Top 10, and tools such as Burp Suite, Nmap, Metasploit, Kali Linux, and Wireshark. Actively seeking a Cybersecurity Intern role to contribute to adversary emulation, detection, and response workflows.

[CURRENT_FOCUS]

Building repeatable recon and pentest workflows, CTF write-ups, and project-based learning across red-team tradecraft and blue-team detection fundamentals.

> Quick Links

$ ls -la /skills

Skills

> Red Team & Web

Reconnaissance
Exploitation
Privilege Escalation
Post-Exploitation
OWASP Top 10 (Web App Pentesting)
MITRE ATT&CK (Foundational)

> Blue Team & DFIR

Log Analysis
SIEM (Splunk / ELK - fundamentals)
Volatility
Autopsy
FTK Imager
YARA

> Languages & Tools

Python
Bash
C
Burp Suite
Nmap
Metasploit
Kali Linux
Wireshark

$ cat /projects/README.md

Projects

Featured project

> Password Cracker Web App

Privacy-first password recovery workflow for encrypted archives and documents.

Code available

Modern web app for recovering numeric-only passwords (0-9) from encrypted files (PDF, ZIP, 7Z, TAR, RAR). Supports digit lengths 1-8, shows real-time progress, processes locally, auto-cleans files, and unlocks downloads securely.

Why it stands out

  • >Local-only processing keeps sensitive files off external servers.
  • >Real-time progress and auto-cleanup make the recovery flow easier to trust.

Tech stack

Web App
Local processing
Progress tracking

Security focus

Privacy-first local processing
Safe file handling
Automation

Project

> MetaGuard - Metadata Privacy App

File metadata scanner and cleaner built to reduce accidental data leakage.

Code available

Privacy-focused web app to detect, analyze, and remove hidden metadata from files (images, documents, media) before sharing. Processes files locally for privacy-first handling, shows real-time analysis progress, provides a risk score, and automates cleanup via policies. Includes user accounts to securely track past analyses and apply custom rules.

Why it stands out

  • >Explains metadata risk in a user-friendly way with a clear risk score.
  • >Combines local analysis with reusable privacy policies for repeat workflows.

Tech stack

Web App
Local processing
Progress tracking
Automation
User accounts

Security focus

Privacy-first architecture
Security-focused design
Safe file handling
Minimal data exposure

Project

> Permission Analyzer

System and app permission auditing for privacy and security awareness.

In progress

Tool to analyze and monitor system/app permissions to identify security and privacy risks. Highlights sensitive access (camera, location, storage) and generates a clear, user-friendly report with fast local processing.

Why it stands out

  • >Turns raw permission data into a readable risk-oriented report.
  • >Focuses on fast local analysis to minimize exposure and friction.

Tech stack

Security analysis
Permissions auditing
Reporting

Security focus

Risk visibility
Privacy awareness
In progress

$ cat /var/log/experience.log

Experience

Internship

> Hacktify Cyber Security - Cybersecurity Intern

08/2025 - 09/2025

  • Performed web application security testing aligned with OWASP Top 10
  • Conducted reconnaissance and vulnerability discovery using Nmap and Burp
  • Participated in attack simulations and exploitation labs
  • Documented findings and remediation recommendations

Current role

> ThunderCipher - Challenge Developer

04/2026 - 10/2026

  • Design and develop CTF-style cybersecurity challenges and labs
  • Create realistic and engaging attack-defense scenarios
  • Test, maintain, and update labs regularly for quality and stability
  • Collaborate with the team to improve platform user experience

> CTF & Labs

TryHackMe (Top 3%)
Hack The Box
BTLO
PortSwigger Academy
CTFtime

[EXTERNAL_PROFILES]

Profiles:

$ cat /etc/education.conf

Education & Learning

> Parul University

B.Tech in Cybersecurity (06/2023 - Present)
Vadodara, Gujarat, India

> Focus areas

Ethical Hacking
Cryptography
Network Security (TCP/IP, DNS, HTTP/S)
Secure System Design
SOC fundamentals (SIEM, alert triage)
DFIR fundamentals

$ cat /var/log/achievements.log

Achievements & Activities

> Highlights

  • NPTEL: Cryptography and Network Security - Top 5% nationwide
  • Runner-Up - Hacker Meetup, Parul University (Quiz, CTF, Bug Bounty)

> Community

  • Core Team Member - The Hacker's Meet-Up & Polyversity Week 2025
  • Organized workshops and CTFs under THM & Bharat Blockchain Yatra - Season 2
  • Stay updated via blogs, videos, and cybersecurity communities

$ cat resume.pdf

Resume

[FILE_INFO]

Download the PDF version of my resume.

$ nc -lv contact.sock

Contact

Start a conversation

Let's talk about internships, projects, or collaboration.

If the form is unavailable, you can still reach me directly through email or LinkedIn from the panel on the left.

Sends via Formspree.

(c) 2026 Shubham Singh (@cybersky). Built with a security-first mindset.

> keep learning | keep shipping | keep testing