root@cyber:~
$whoami

> Shivang Tiwari

a.k.a sh1v4ng

$cat ./role.txt

Security Engineer (Red Team Research & Offensive Security)

$cat ./mission.txt

Primary focus on red team security research and VAPT, with automation to scale testing and a light touch on blue/purple fundamentals.

$โ–ˆ
scroll down
///

About.me

I'm Shivang Tiwari โ€” a Security Engineer focused on red team research, VAPT, and web/API/cloud attack paths. Currently building AI-powered vulnerability detection at Astra Security.

Explore my work on GitHub ยท CV ยท Resume (PDF)

Profile picture
63
CTF Writeups
1
Research Blogs
27
Security Notes
30+
CTF Events
Top 1%
TryHackMe Rank
5+
Events Organised
1+ Year
Experience
BFCET'24
Hackathon Runners Up
///

Skills.matrix

Attack Chaining & Exploitation92%
Reconnaissance & Attack Surface Mapping90%
Threat Modelling & Risk Analysis88%
Web/API Exploitation (OWASP Top 10)92%

> Key tools:

Burp SuiteOWASP ZAPSQLMapNmapGobusterMetasploit

> Tech stack:

Burp Suite
Burp Suite
OWASP ZAP
OWASP ZAP
SQLMap
SQLMap
Nmap
Nmap
Gobuster
Gobuster
Metasploit
Metasploit

>Additional expertise:

Advanced Persistent Threat SimulationAttack Chain DevelopmentDAST / SAST Pipeline EngineeringAI-Driven Vulnerability DetectionAutonomous Security AgentsCloud Offense & Defense (AWS)API Fuzzing & Business Logic AbuseWAF / IDS Evasion TechniquesThreat Intelligence & ModellingIncident Response & TriageDetection Engineering (Sigma/YARA)Security Automation & Orchestration

$ echo "Open to Red Team Security Research and Security Engineering roles."

> Open to Red Team Security Research and Security Engineering roles.

$ uptime

> Portfolio online since 2024 | Last updated: Mar 2026

"No one is useless in this world who lightens the burdens of another." โ€” Charles Dickens

Considered a small donation if you found any of the walkthrough or blog posts helpful. Much appreciate :)

Buy me a coffee

ยฉ 2026 Shivang Tiwari. Built with Next.js. Hack the planet.