default

HITARTH SHAH

40+
Vulnerabilities
20+
CTF PWNED
30+
Clients
10+
Hall Of Fame's
APPLE logoAPPLE
NETFLIX logoNETFLIX
IBM logoIBM
NOKIA logoNOKIA
BLACKBERRY logoBLACKBERRY
SHELL logoSHELL
INTEL logoINTEL
H&M logoH&M
LENOVO logoLENOVO
FERRARI logoFERRARI
PORSCHE logoPORSCHE
ACCENTURE logoACCENTURE
AUDI logoAUDI
NIKE logoNIKE
ADIDAS logoADIDAS
WESTERN DIGITAL logoWESTERN DIGITAL
APPLE logoAPPLE
NETFLIX logoNETFLIX
IBM logoIBM
NOKIA logoNOKIA
BLACKBERRY logoBLACKBERRY
SHELL logoSHELL
INTEL logoINTEL
H&M logoH&M
LENOVO logoLENOVO
FERRARI logoFERRARI
PORSCHE logoPORSCHE
ACCENTURE logoACCENTURE
AUDI logoAUDI
NIKE logoNIKE
ADIDAS logoADIDAS
WESTERN DIGITAL logoWESTERN DIGITAL

COMPANIES I'VE SECURED & ACKNOWLEDGED BY

About

I’m a proactive Security Researcher and beginner ethical hacker with over a year of hands-on experience in Bug Bounty, Vulnerability Assessment, and Penetration Testing (VAPT) across web, mobile, and cloud environment's.

I’ve been officially acknowledged by Apple, Nokia, Blackberry, Mercedes , Ferrari, Accenture and the US Department of Defense for reporting critical security vulnerabilities, demonstrating a growing ability to help secure enterprise-grade systems.

When I’m not uncovering vulnerabilities, I enjoy playing cricket, going on trips, spending quality time with my family, and occasionally just vibing while coding my next project...

Education

B.Tech Computer Science

Cybersecurity • CGPA 9.3

SilverOak University

Location

Ahmedabad, India

Specialization

Learning Red Team Operations

Web Security Research

Status

Available for Projects

Expertise Metrics

Penetration Testing0%
Web App Security0%
Cloud Security0%
Network Security0%
Mobile Security0%
AI/LLM Security0%

Tools & Tech Experience

20%40%60%80%100%Burp SuiteAwsCustom-BashLLM-AiPostmanLinux

Using and learning these tools & technologies since 2022 — evolving from the basics of cybersecurity and hacking to mastering industry-standard methods with hands-on experience.

Experience

Security Analyst Intern

TechDefence Labs, Ahmedabad

Jan 2025 – Jul 2025

Executed comprehensive VAPT for 30+ clients across finance, automobile, and fintech sectors

Conducted penetration testing on web applications, APIs, and mobile platforms identifying SQLi, RCE, and business logic flaws

Authored detailed security assessment reports with risk analysis and remediation recommendations

Security Analyst Intern

Infopercept India Pvt Ltd, Gandhinagar

Jun 2024 – Sep 2024

Contributed to design and implementation of enterprise network security solutions

Performed vulnerability assessments on internal and external corporate systems

Supported SOC functions with SIEM monitoring and incident response procedures

Key Achievements

Apple CVE-2018-15599

Identified and responsibly disclosed a high-severity User Enumeration vulnerability in Apple's SSH server. Formally patched and acknowledged in iOS 18.4, iPadOS 18.4, and macOS Sequoia 15.4.

National Infrastructure Security

Uncovered critical S3 bucket misconfiguration on pmindia.gov.in and high-severity vulnerability within cbi.gov.in domain. Acknowledged by India's National CERT (CERT-In).

Automotive Security Research

Identified critical vulnerabilities for Porsche AG and discovered 5+ high-impact vulnerabilities across Mercedes-Benz AG and Audi internal networks.

Hall of Fame Recognition

Received Hall of Fame recognition from Blackberry (Nov 2024) earning "Leading Reporter Acknowledgement 2024" and acknowledged by Nokia for securing critical network assets.

Projects

Threat Cast: AI Security Platform

Dec 2024 – May 2025

Architected an AI-driven security platform to streamline workflows for red teamers and security engineers. Features 'Deep Research Mode' for automated threat modeling and CVE-to-exploit chain mapping with real-time threat intelligence.

PythonLangChainStreamlitOllama
Visit Threat Cast

Custom Security Tools

Ongoing

Developed UNIX Kernel Compliance Testing Scripts and various security research tools. Utilized open-source APIs and standardized compliance checklists for effective security automation.

BashPythonSecurity Automation

Let's Connect

Ready to secure your digital infrastructure? Let's discuss how we can work together to identify vulnerabilities and strengthen your security posture.

START A PROJECT