Skip to content
View spk-777N's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Block or report spk-777N

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
spk-777N/README.md

Hi I'm Nazeer ๐Ÿ‘‹

LinkedIn Gmail

I'm a Penetration Tester with a passion for offensive security, ethical hacking, and helping organizations identify and fix their vulnerabilities before attackers can exploit them. I specialize in Web, API, Mobile, and Network Penetration Testing, and I enjoy turning weaknesses into actionable improvements.

๐Ÿ” Tools & technologies I work with regularly include: Burp Suite, Nmap, Wireshark, Metasploit, OWASP ZAP, SQLmap, ffuf, Subfinder, Amass, APKTool, MobSF, ADB, and JWT Debugger.

๐Ÿ’ก Areas of expertise:

  • Web Application Pentesting (OWASP Top 10)
  • Mobile App Security (Android)
  • API Pentesting (REST & GraphQL)
  • Reconnaissance and Subdomain Enumeration
  • Vulnerability Scanning & Manual Exploitation
  • Reporting with PoCs and remediation guidance

๐Ÿš€ Sample Projects & Experience:

  • Built automated recon workflows using Bash, Python, and tools like httpx, nuclei, and gf
  • Discovered critical IDOR and authentication flaws in live systems
  • Performed mobile app assessments using static/dynamic analysis (MobSF, Frida, APKTool)
  • Participated in bug bounty programs on platforms like HackerOne & Bugcrowd

๐Ÿ’ฌ Ask me about: Offensive Security, Bug Bounty, Red Teaming, Exploit Development, or Reporting Best Practices

Pinned Loading

  1. portswigger-academy-labs portswigger-academy-labs Public

    portswigger-academy-labs - "My way of solving labs - There are also other better methods for solving, so don't just stop here and search."

    1

  2. C0NQR0R/Enhanced-OWASP-TestingGuide-v4.2 C0NQR0R/Enhanced-OWASP-TestingGuide-v4.2 Public

    An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionable examples, and real-world scenarios for beginners and advaโ€ฆ

    85 12

  3. Android-Application-Penetration-Testing Android-Application-Penetration-Testing Public