Skip to content
View Xclusive-Ishan's full-sized avatar

Block or report Xclusive-Ishan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Xclusive-Ishan/README.md

πŸ›‘οΈ Ishan Shah | Threat Researcher | Certified Web Pentester | GRC Scholar | Upcoming Google Cybersecurity Certified Professional πŸ”

"Transforming threats into opportunities to defend the digital frontier."

Cybersecurity Threat Hunting Penetration Testing



πŸš€ About Me Discord Instagram LinkedIn Quora email

πŸ”Ή Currently:

  • Focus: Web privacy and compliance
  • First author of related research work

πŸ”Ή Collaboration Interests:

  • Threat understanding and vulnerability exploration
  • System security improvements
  • Working with security-passionate teams

πŸ”Ή Open to:

  • Being part of Organizations, Research labs, or Companies in Cybersecurity.

  • Gaining experience and contributing to the field.

πŸ”Ή Currently Learning:

  • Threat analysis
  • Advanced Penetration testing
  • Advanced cybersecurity research methods

πŸ”Ή Ask Me About:

  • Certified Pentester experience
  • Researcher journey
  • Building a cybersecurity career

πŸ”Ή Fun Fact:

  • Spent nights analyzing threat patterns
  • "Sleep can wait, vulnerabilities can't" πŸ•΅οΈβ€β™‚οΈπŸ’»


πŸ΄β€β˜ οΈ Skills & Expertise

πŸ–₯️ Testing Skills: Penetration Testing, API Testing (Postman), Automated Testing (Selenium, JMeter)
πŸ‘Ύ Security and Network Analysis: Metasploit, Nmap, Wireshark, Nessus, Snort, Splunk
πŸ” Web & API Security: Burp Suite, Nikto, SQLMap, Dirbuster
πŸ•΅οΈ OSINT & Reconnaissance: Maltego, Shodan, Google Dorking, SpiderFoot, theHarvester, OSINT Framework

πŸ›‘οΈ Defensive Security (Blue Team)
πŸ–₯️ SIEM & Monitoring: Splunk
🚨 Incident Response: Wireshark
⚠️ Malware Analysis: Cuckoo

πŸ“€ Operating Systems & Networks
🐧 Linux: Linux (Kali, Ubuntu), Windows (Server, Active Directory)
πŸ–₯️ Windows Security: PowerShell
🌐 Network Security: Nmap, Netcat

πŸ” Artificial Intelligence & Machine Learning
πŸ€– Machine Learning (ML): Supervised and Unsupervised Learning,Transfer Learning & Fine-tuning LLM's.
πŸ“Έ Computer Vision: Object Detection, Image Classification,YOLO ,Segmentation

πŸŽ“ Certifications: TryHackMe Junior Web Pentester, Google Cybersecurity Certified Professional(ongoing)

πŸ’» Tech Stack:

C C++ JavaScript Python Bash Script Windows Terminal Anaconda nVIDIA Flask Flutter OpenCV WordPress Nginx Apache MySQL MicrosoftSQLServer Canva Matplotlib NumPy Pandas PyTorch scikit-learn Scipy GitHub Git CMake Gradle Docker Postman Splunk TOR

πŸ“Š GitHub Stats:



πŸ† GitHub Trophies

✍️ Dev Quote

πŸ” Top Contributed Repo


Pinned Loading

  1. Attack-Chain-Honeypot-Framework Attack-Chain-Honeypot-Framework Public

    This project introduces a reverse-honeypot approach, deploying compromised systems to observe attacker behavior in real-world scenarios. Unlike traditional honeypots, these are exploited by attacke…

    Python 1