001
IDENTITY
AVAILABLE FOR WORK — UPDATED FEB 2025
PREYANSH
SHAH
OFFENSIVE SECURITY ENGINEER
SCROLL ↓
002
MISSION
I BREAK
THINGS
TO MAKE
THEM
UNBREAKABLE.
003
BRIEF
0+ YEARS
BB HUNTING
BB HUNTING
0+ VULNS
REPORTED
REPORTED
0+ TARGETS
BREACHED
BREACHED
Specialized in Red Teaming, Application Security, and Offensive Security. Focused on real-world attack simulation, exploitation, and defense hardening. Building robust digital defenses by finding and abusing weaknesses before real attackers do.
004
FOCUS
- 01 RED TEAMING —
- 02 APPLICATION SEC —
- 03 EXPLOIT DEV —
- 04 DEFENSE HARD. —
005
CLASSIFIED
In ████, I found my first vulnerability in a ████████████████. It paid ████████████ but taught me everything. The target was █████████ and the bug was █████████████. My handle on H1 is ██████████. I once broke into a system that ████████████████████. The bounty was ████████████.
↑ HOVER TO DECLASSIFY
006
FIND THE FLAW FIRST.
FIX IT BEFORE
IT'S EXPLOITED.
— PREYANSH SHAH
007
BOUNDARIES
THINGS I WILL NOT DO. NON-NEGOTIABLE.
- ✕ UNAUTHORIZED ACCESS WITHOUT WRITTEN SCOPE
- ✕ MALWARE DEVELOPMENT FOR OFFENSIVE USE
- ✕ CRITICAL INFRASTRUCTURE ATTACKS
- ✕ SELLING VULNS TO UNKNOWN THIRD PARTIES
- ✕ SKIPPING RESPONSIBLE DISCLOSURE
008
FIND ME
Prefer email? Reach out via the contact form below.
009
CONTACT