Skip to content
View hemantsolo's full-sized avatar
πŸ’»
Work From Home
πŸ’»
Work From Home

Highlights

  • Pro

Block or report hemantsolo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hemantsolo/README.md

Hi πŸ‘‹, I'm Hemant Patidar (HemantSolo)

Cybersecurity Enthusiast | Certified Ethical Hacker from India

Cybersecurity

  • πŸ”­ I’m currently working as Senior Security Research at LoginSoft

  • πŸ”’ Secured: Apple, Google, Facebook, WordPress, Indian Govt., U.S. Department of Defense, and many more.

  • πŸ”₯ With a passion for offensive security, I specialize in penetration testing, ethical hacking, and vulnerability research, helping organizations secure their digital assets.
    (Web & Mobile Security | Network Pentesting | API & Cloud Security | Secure Coding | Source Code Analysis | SCA - Supply Chain Analysis)

  • πŸ‘¨β€πŸ’» More About me: HemantSolo.in

  • πŸ“ I write articles on security & bug bounty at hemantsolo.medium.com

  • πŸ’¬ Ask me about Offensive Security, Vulnerability Research, Penetration Testing, Bug Bounty Hunting, Source Code Analysis, and Supply Chain Security

  • πŸ“« How to reach me: hello@hemantsolo.in

  • πŸŽ“ Certifications: CEH - Master, eCPPT, eWPTX, eJPT, CAPen, CAP, CNSP

  • πŸš€ Fun fact: Break ➝ Hack ➝ Secure

Connect with me:

HemantSolo HemantSolo HemantSolo HemantSolo


πŸ›‘οΈ Cybersecurity & Hacking Skills

πŸ”Ή Penetration Testing
πŸ”Ή Web, Mobile, API, Cloud & Network Security
πŸ”Ή Bug Bounty Hunting
πŸ”Ή Red Teaming & Ethical Hacking
πŸ”Ή Secure Code Auditing
πŸ”Ή Reverse Engineering
πŸ”Ή Source Code Analysis (Static & Dynamic)
πŸ”Ή SCA / Software Supply Chain Analysis

πŸ› οΈ Tools & Technologies

πŸ”Ή Burp Suite
πŸ”Ή Nmap
πŸ”Ή Wireshark
πŸ”Ή Metasploit
πŸ”Ή SQLMap
πŸ”Ή John the Ripper
πŸ”Ή Aircrack-ng
πŸ”Ή OSINT Framework
πŸ”Ή Kali Linux & Parrot OS
πŸ”Ή IDA Pro, Ghidra
πŸ”Ή OpenVAS, Nessus

πŸ“œ Certifications

πŸ”Ή CEH - Master (Certified Ethical Hacker - Master)
πŸ”Ή eJPT (Junior Penetration Tester)
πŸ”Ή eCPPT (Certified Professional Penetration Tester)
πŸ”Ή eWPTX (Web Application Penetration Tester eXtreme)


🎯 Bug Bounty Instructor

I help aspiring ethical hackers learn advanced security techniques and bug bounty methodologies. Passionate about spreading cybersecurity awareness and securing the digital world! πŸ”₯


πŸ“© Want to Collaborate?

I'm always open to security research collaborations, ethical hacking projects, source code security reviews, or mentorship. Feel free to reach out! πŸ’»πŸš€

Pinned Loading

  1. Bug-Bounty-Dorks-And-Platforms Bug-Bounty-Dorks-And-Platforms Public

    This are some Dorks and Platform to find the Bug Bounty Programs.

    80 40

  2. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python 2 3

  3. SecLists SecLists Public

    Forked from danielmiessler/SecLists

    SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

    PHP 1 1

  4. the-book-of-secret-knowledge the-book-of-secret-knowledge Public

    Forked from trimstray/the-book-of-secret-knowledge

    A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

    8 2

  5. Host-Header-Injection-Vulnerability-Scanner Host-Header-Injection-Vulnerability-Scanner Public

    Host Header Vulnerability Scanner Automated Tool

    Shell 27 8