> Cybersecurity Portfolio
Shubham Singh_
@cybersky
Cybersecurity student building offensive and defensive projects with a practical, privacy-first mindset.
Hands-on in web application pentesting, CTFs, attack-defense simulations, and detection fundamentals. I am looking for internship opportunities where I can contribute and keep shipping real security work.
Status Board
What I bring
Practical security projects, clear write-ups, and internship-ready offensive and defensive workflows that show how I think, test, and communicate.
$ cat profile.md
About Me
Cybersecurity student with hands-on experience across red and blue teaming, including web application penetration testing, CTFs, attack simulation, and detection fundamentals. Skilled in reconnaissance, exploitation, OWASP Top 10, and tools such as Burp Suite, Nmap, Metasploit, Kali Linux, and Wireshark. Actively seeking a Cybersecurity Intern role to contribute to adversary emulation, detection, and response workflows.
[CURRENT_FOCUS]
Building repeatable recon and pentest workflows, CTF write-ups, and project-based learning across red-team tradecraft and blue-team detection fundamentals.
> Quick Links
$ ls -la /skills
Skills
> Red Team & Web
> Blue Team & DFIR
> Languages & Tools
$ cat /projects/README.md
Projects
Featured project
> Password Cracker Web App
Privacy-first password recovery workflow for encrypted archives and documents.
Modern web app for recovering numeric-only passwords (0-9) from encrypted files (PDF, ZIP, 7Z, TAR, RAR). Supports digit lengths 1-8, shows real-time progress, processes locally, auto-cleans files, and unlocks downloads securely.
Why it stands out
- >Local-only processing keeps sensitive files off external servers.
- >Real-time progress and auto-cleanup make the recovery flow easier to trust.
Tech stack
Security focus
Project
> MetaGuard - Metadata Privacy App
File metadata scanner and cleaner built to reduce accidental data leakage.
Privacy-focused web app to detect, analyze, and remove hidden metadata from files (images, documents, media) before sharing. Processes files locally for privacy-first handling, shows real-time analysis progress, provides a risk score, and automates cleanup via policies. Includes user accounts to securely track past analyses and apply custom rules.
Why it stands out
- >Explains metadata risk in a user-friendly way with a clear risk score.
- >Combines local analysis with reusable privacy policies for repeat workflows.
Tech stack
Security focus
Project
> Permission Analyzer
System and app permission auditing for privacy and security awareness.
Tool to analyze and monitor system/app permissions to identify security and privacy risks. Highlights sensitive access (camera, location, storage) and generates a clear, user-friendly report with fast local processing.
Why it stands out
- >Turns raw permission data into a readable risk-oriented report.
- >Focuses on fast local analysis to minimize exposure and friction.
Tech stack
Security focus
$ cat /var/log/experience.log
Experience
Internship
> Hacktify Cyber Security - Cybersecurity Intern
08/2025 - 09/2025
- Performed web application security testing aligned with OWASP Top 10
- Conducted reconnaissance and vulnerability discovery using Nmap and Burp
- Participated in attack simulations and exploitation labs
- Documented findings and remediation recommendations
Current role
> ThunderCipher - Challenge Developer
04/2026 - 10/2026
- Design and develop CTF-style cybersecurity challenges and labs
- Create realistic and engaging attack-defense scenarios
- Test, maintain, and update labs regularly for quality and stability
- Collaborate with the team to improve platform user experience
> CTF & Labs
$ cat /etc/education.conf
Education & Learning
> Parul University
> Focus areas
$ cat /var/log/achievements.log
Achievements & Activities
> Highlights
- NPTEL: Cryptography and Network Security - Top 5% nationwide
- Runner-Up - Hacker Meetup, Parul University (Quiz, CTF, Bug Bounty)
> Community
- Core Team Member - The Hacker's Meet-Up & Polyversity Week 2025
- Organized workshops and CTFs under THM & Bharat Blockchain Yatra - Season 2
- Stay updated via blogs, videos, and cybersecurity communities
$ cat resume.pdf
Resume
$ nc -lv contact.sock
Contact
> Direct
Start a conversation
Let's talk about internships, projects, or collaboration.
If the form is unavailable, you can still reach me directly through email or LinkedIn from the panel on the left.