Skip to main content

Amber Sharma

Cybersecurity Analyst &

Offensive Security Expert | VAPT Specialist | Securing Digital Systems Through Advanced Penetration Testing and Vulnerability Assessments.

πŸ‘¨β€πŸ’»
Red Team Operations

About Me

Background

As a dedicated Cybersecurity Analyst specializing in offensive security, I focus on identifying and exploiting vulnerabilities to strengthen digital defenses. My expertise spans across vulnerability assessments, penetration testing, and red team operations.

Experience

As a Cyber Security Analyst with over a year of experience in offensive cybersecurity, I specialize in Vulnerability Assessment and Penetration Testing. I conduct simulated attacks to identify and exploit vulnerabilities in networks, applications, and systems, helping organizations strengthen their defenses. I’ve discovered critical vulnerabilities in platforms like Google, Instagram, and Apple, enhancing their security. By replicating real-world attacks, I empower organizations to proactively address threats, reduce attack surfaces, and improve their security posture.

Current Work

C9Lab (Pinak Infosec Pvt. Ltd)

Cyber Security Analyst

Aug 2023 – Present

Key Expertise

  • > Vulnerability Assessment
  • > Penetration Testing
  • > Red Team Operations
  • > Security Research
  • > Bug Bounty Hunting

Ethical Hacking & Cybersecurity Training!

πŸ” Our Mission: Empowering individuals with real-world cybersecurity skills in penetration testing, ethical hacking, and digital asset protection. 🌟 Our Training Programs: βœ… Ethical Hacking & Penetration Testing – Master offensive security techniques. βœ… Web & Network Security – Learn secure coding and network defense. βœ… Mobile & API Security – Secure Mobile platforms and APIs. βœ… Digital Forensics & Incident Response – Investigate and respond to cyber threats.

Technical Expertise

πŸ›‘οΈ

Security Tools

  • > Nmap
  • > Nessus
  • > Nikto
  • > Burp Suite
  • > Metasploit
  • > Wireshark
πŸ’»

Programming

  • > Python
  • > Bash Scripting
  • > Shell Scripting
  • > JavaScript
πŸ—„οΈ

Infrastructure

  • > MySQL
  • > MongoDB
  • > Linux Systems
  • > Cloud Security

Specialized Areas

Web Security
Network Security
API Security
Mobile Security

Methodologies

OWASP Top 10
VAPT
Red Teaming
Bug Bounty

Featured Projects

SSH Hacking Project

Python Nmap

Automated security assessment tool that combines Nmap scanning capabilities with SSH brute-force functionality using the ssh-brute.nse script.

> Automated port scanning and service detection
> Custom wordlist integration
> Detailed vulnerability reporting

Nikto Automation Script

Bash Nikto

Automated web server vulnerability scanner that leverages Nikto to identify security issues and generate comprehensive reports.

> Automated vulnerability scanning
> Custom scan configurations
> HTML report generation

Certifications & Education

Professional Certifications

Master in Cyber Security & Penetration Testing

Jetking

EC-Council Certifications:

>

Hands-on Penetration Testing with Netcat

>

15 Must-Have Tools for Pentesters

>

Master Wi-Fi Ethical Hacking: Evil Twin Attacks

>

Hands-on JavaScript for Ethical Hacking

>

Top 5 Tools & Tricks for Ethical Hacking & Bug Bounties

>

Reverse Engineering: Frida for Beginners

Academic Background

Bachelor of Business Administration

2020-2024

Shri RGP Gujarati Professional Institute

Indore

CGPA: 6.40

Focused on cybersecurity certifications while pursuing Business Administration

Latest Blog Posts

Security Research Aug 10, 2024

Critical Vulnerability Found in OpenAI Session Management

The discovered vulnerability revolves around OpenAI’s handling of session cookies...

Read More
Tutorial Feb 14, 2024

What is CraxsRat What can it do

Imagine if someone could secretly control your phone! That’s the scary reality with CraxsRat...

Read More
Tools Feb 13, 2024

MISP (Malware Information Sharing Platform)

MISP, which stands for Malware Information Sharing Platform and Threat Sharing...

Read More

Hall of Fame

πŸ†
Verified

Google

Session hijacking vulnerability discovered and reported in Google's infrastructure

Security Research
🎯
Verified

Instagram

Successfully identified and reported security vulnerabilities

Bug Bounty
πŸ”’
Verified

Apple

Enhanced security measures through vulnerability reporting

Security Audit
50+
Vulnerabilities Reported
3
Major Platforms
100%
Success Rate
24/7
Security Research

Public Recognition

Acknowledged by leading tech companies for contributing to their security infrastructure and helping protect millions of users worldwide.

Get in Touch

Contact Information