Skip to content
View 5h4rk-lab's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report 5h4rk-lab

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
5h4rk-lab/README.md

Go Charan Kilaru | Security Engineer

typing headline

Portfolio Email LinkedIn Twitter

Visitors


πŸ›‘οΈ About

Security Engineer (Application & Cloud) focused on threat modeling, secure design/code review, CI/CD security guardrails (SAST/DAST), incident response, and network security.
πŸŽ“ M.S. Cybersecurity @ University of Delaware (GPA 3.96) β€” research on secure EV charging protocols (LIN-CP) & embedded security.

  • Built secure boot + signed firmware for EVSE controllers; integrated memory-safety tooling & PR gates.
  • Shipped cloud telemetry (AWS/GCP) with least-privilege IAM, secrets/KMS, audit logging, anomaly detection.
  • Reported 80+ critical vulns (XSS, SSRF, RCE) via bug bounty programs.

Motto: Build it secure. Break it better. Fix it faster.


βš™οΈ Stack & Tools

Security focus: Application Security, Cloud Security, Secure SDLC, Threat Modeling, Network Security, Secure Code Review, VAPT, API Security, Risk Assessment, IAM / Secrets / KMS, SIEM / IDPS, Incident Response, Digital Forensics


πŸ“Š Stats


πŸ† Certifications
  • CEH – Certified Ethical Hacker
  • GCP Professional Cloud Security Engineer
  • CRTP – Certified Red Team Professional
  • eJPT – INE Junior Penetration Tester
πŸ“š What I Actually Do
  • Design: Threat models, security architecture reviews, secure SDLC guardrails
  • Build: IaC & pipelines for SAST/DAST, secrets management, IAM boundaries
  • Break: Pentesting (web/mobile), misuse cases, fuzzing, reverse engineering
  • Respond: Alert triage, incident RCA, tabletop exercises
  • Enable: Security playbooks, developer training, documentation

πŸ›°οΈ Contact

mario-runner

An image of @5h4rklab's Holopin badges, which is a link to view their full Holopin profile

Pinned Loading

  1. CTF-resource CTF-resource Public

    This help a biggener CTF player with some knowledge when he is struck!

    JavaScript 2 3

  2. Spotify-clone Spotify-clone Public

    This is a spotify clone developed using tailwindcss nextjs,middleware and debounce for audio control.

    JavaScript 1 1

  3. King-of-the-hill King-of-the-hill Public

    Forked from holmes-py/King-of-the-hill

    This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.

  4. CRTP-CMD-Cheetsheet CRTP-CMD-Cheetsheet Public

    Command cheet sheet for CRTP-pentester_academy

    2