Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View iamshafayat's full-sized avatar
👾
chmod +x mindset // ready to execute.
👾
chmod +x mindset // ready to execute.

Block or report iamshafayat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
iamshafayat/README.md

🟥🟨🟩

┌──(M4st3r_mind㉿kali)-[~/whoami] 
└─$ ./recon.sh --profile
/// <summary>
/// Hello there, I am Shafayat Ahmed Alif,  
/// Cybersecurity Researcher & Ethical Hacker.  
/// Specialized in Red Teaming, Web App Security, and OSINT.  
/// Cyber Security Researcher | Bug Bounty Hunter | CTF Player.  
/// Skilled in Vulnerability Analysis, Penetration Testing, and Threat Hunting.  
/// Turning vulnerabilities into opportunities for stronger defense.  
/// Always available for pwnage.
/// </summary>

public class INFORMATION
{
¦    public string NAME = "Shafayat Ahmed Alif";
¦    public string TITLE = "Security Researcher";
¦    public string[] LOCATION = { "Dhaka", "Bangladesh" };
¦    public int AGE = 25;
}

public partial class FORMATIONS : Higher_Education
{
¦    private void ICAN(string[] _Degrees)
¦    {
¦    ¦    var _Level    = Bachelor;
¦    ¦    var _Duration = "Jan 2023 - Present";
¦    ¦    var _Focus    = "Programming, Hacking, Networking, OSINT";
¦    }
}

public class EXPERIENCE
{
¦    public string Role1   = "Security Researcher @ HackerOne";
¦    public string Role2   = "Security Researcher @ Bugcrowd";
¦    public string Role3   = "Security Researcher @ YesWeHack";
¦    public string Role4   = "Penetration Tester @ Cipher Shadow IT";
¦    public string Role5   = "Security Researcher @ Gray Hat Squad";
¦    public string[] CTF   = { "Pirates of The Dead Flag" };
}

public enum PLATFORMS
{
¦    Windows,
¦    Linux,
¦    Mobile
}

public enum SKILLS
{
¦    Cyber Security Researcher,
¦    Ethical Hacker,
¦    Bug Bounty Hunter,
¦    Red Teamer,
¦    CTF Player
}

public enum LANGUAGE
{
¦    ENGLISH      // Fluent
¦    BANGLA       // Native
¦    URDU/HINDI   // Conversational
}

public static class SOCIAL_MEDIA
{
¦    public void codeLinks()
¦    {
¦    ¦    var LinkedIn = "https://www.linkedin.com/in/iamshafayat/";
¦    ¦    var Medium   = "https://medium.com/@iamshafayat";
¦    ¦    var GitHub   = "https://github.com/iamshafayat";
¦    ¦
¦    ¦    /*
¦    ¦     These are my cyber-frequency handles.
¦    ¦     Ping me anytime you smell 0day.
¦    ¦    */
¦    }
}

Pinned Loading

  1. ReconPro ReconPro Public

    ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.

    JavaScript 38 4

  2. JSpider JSpider Public

    JSpider is a smart crawler for hidden endpoints. It crawls and extracts hidden API endpoints and URLs from JavaScript files and HTML source code — all directly in your browser.

    JavaScript 7 3