Skip to content
View e11i0t4lders0n's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report e11i0t4lders0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
e11i0t4lders0n/README.md

Hi there, thanks for visiting my profile 👋

Tushar Verma | Twitter Tushar Verma GIF

Who-Am-I

A small town boy and a Security Engineer by passion. Here's a little about me :)

Tushar Verma is currently working as a Security Engineer at People Interactive(I)Pvt. Ltd. (Shaadi.com) and also one of the Synack Red Team Member. He is currently doing a bachelors degree in Computer Science & Engineering with minor in DevOps. His major interests revolve around Application Security, Cloud Security, DevOps & DevSecOps. He is having 2+ year of expertise in security implementations and various security assessments which includes VAPT, Application Security testing, Cloud Security, DevOps & DevSecOps.

Area of Expertise:-

-Application Security
-Penetration Testing & Red Teaming
-Cloud Operations & Security
-DevOps & DevSecOps
-Reconnaissance & Asset Mapping
-Social Engineering
-IT Security Audit

Achievements:-

-Speaker at Reconvillage@DEFCON 29(The Bug Hunter's Recon Methodology)
-Speaker at GrabCON 2021(Exploiting SSRF like a boss)
-Speaker at BSides Noida Conference 2021(How to Fail at Bug Bounty Hunting)
-Speaker at DAMNCON '21(Hacking Oauth Application)
-Speaker at Owasp Gurugram(Bypassing Two-Factor Authenication for fun & profit)
-Speaker at Owasp Erode(Methodologies and Approach to start Bug Bounty Hunting)
-Speaker at HackersForYou(Bypassing 2FA)
-Speaker at GirlScript Kurukshetra(Beginners Guide to get started in Bug bounty)
-Speaker at Girlscript Jalandhar(Getting started in Bug Bounty)
-Guest Speaker: Take Care of Yourself & Take Care of your Money at Lovely Professional University

Awards and Recognition

-Appreciation by Google For Finding Sensitive Information Sensitive Data Exposure
-Appreciation by Netflix For Finding Business Logic Vulnerability
-Appreciation by Unilever Vulnerability Disclosure Program For Finding Authentication Bypass
-Appreciation by Dell, UnderArmour, Convertkit, Cloudways, Mastercard for Finding Vulnerability

Popular repositories Loading

  1. Web-Application-Pentest-Checklist Web-Application-Pentest-Checklist Public

    522 103

  2. Bugbounty-Resources Bugbounty-Resources Public

    83 25

  3. Awesome-Bugbounty-Writeups Awesome-Bugbounty-Writeups Public

    Forked from devanshbatham/Awesome-Bugbounty-Writeups

    A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

    Python 21 8

  4. SAML-SSO SAML-SSO Public

    18 2

  5. my_aws_blogs my_aws_blogs Public

    11

  6. sql-injection-payload-list sql-injection-payload-list Public

    Forked from payloadbox/sql-injection-payload-list

    🎯 SQL Injection Payload List

    10 7