Coder Social home page Coder Social logo

$whoami~ πŸ‘‹

Bishal Aryal aka. C15C001337

About Me

With over 1.7 year+ experience as a Security Engineer with extensive expertise in web, network, and mobile security vulnerability assessments and penetration testing. My strong technical foundation is further strengthened by deep knowledge in Cryptography, Web Security, Reconnaissance, and Infrastructure Security, with a focus on system hardening and implementing robust security measures. Throughout my career as a Security Engineer which lies in uncovering vulnerabilities and fortifying systems, helping organizations enhance their overall security posture through meticulous assessments and advanced security strategies.

As the Co-founder of the CTF team Hack@Sec, I have led the team to numerous national and international victories, representing Nepal on global stages such as Black Hat MEA 2023 and many other international CTF competitions. Our team’s success stems from a commitment to continuously learning new technologies and pushing the boundaries by breaking and understanding complex systems.

πŸ“Š GitHub Stats:



πŸ† GitHub Trophies

Technical Skills

Azure R&D Secure Coding Web Security Network Security Mobile Security System Administration Cryptography Infrastructure Security Penetration Testing Python JavaScript HTML5 CSS3 PHP Bash Java Docker Kubernetes AWS Azure GCP Git GitHub/GitLab VSCode Django Flask React PostgreSQL MySQL Mongo OpenSearch Redis Nginx

Links

Twitter | LinkedIn | Medium Blog | CTFtime

Bishal Aryal's Projects

403 icon 403

403/401 Bypass Methods + Bash Automation + Your Support ;)

90daysofdevops icon 90daysofdevops

This repository is my documenting repository for learning the world of DevOps. I started this journey on the 1st January 2022 and I plan to run to March 31st for a complete 90-day romp on spending an hour a day including weekends to get a foundational knowledge across a lot of different areas that make up DevOps.

anti-virus-evading-payloads icon anti-virus-evading-payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

api-security-checklist icon api-security-checklist

Checklist of the most important security countermeasures when designing, testing, and releasing your API

assetfinder icon assetfinder

Find domains and subdomains related to a given domain

athenz-test icon athenz-test

Open source platform for X.509 certificate based service authentication and fine grained access control in dynamic infrastructures. Athenz supports provisioning and configuration (centralized authorization) use cases as well as serving/runtime (decentralized authorization) use cases.

autorecon icon autorecon

Simple shell script for automated domain recognition with some tools

awesome-api-security icon awesome-api-security

A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.

awesome-bugbounty-writeups icon awesome-bugbounty-writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

awesome-hacker-search-engines icon awesome-hacker-search-engines

A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more

awesome-tunneling icon awesome-tunneling

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

awesome-waf icon awesome-waf

πŸ”₯ Web-application firewalls (WAFs) from security standpoint.

bb-payloads icon bb-payloads

List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.

bbscope icon bbscope

Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!

bigbountyrecon icon bigbountyrecon

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.