We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?
Schedule Interview NowMy name is Himangkumar S. and I have over 3 years of experience in the tech industry. I specialize in the following technologies: Web App Penetration Testing, Vulnerability Assessment, Penetration Testing, Network Penetration Testing, Web Application Security, etc.. I hold a degree in Bachelor of Technology (BTech), . Some of the notable projects I've worked on include: Network Penetration Testing, Penetration Testing Sample Report [Web App], Server Side Request Forgery (SSRF) with NTLM relay attacks, Sample Work. I am based in Surat, India. I've successfully completed 4 projects while developing at Softaims.
I am a dedicated innovator who constantly explores and integrates emerging technologies to give projects a competitive edge. I possess a forward-thinking mindset, always evaluating new tools and methodologies to optimize development workflows and enhance application capabilities. Staying ahead of the curve is my default setting.
At Softaims, I apply this innovative spirit to solve legacy system challenges and build greenfield solutions that define new industry standards. My commitment is to deliver cutting-edge solutions that are both reliable and groundbreaking.
My professional drive is fueled by a desire to automate, optimize, and create highly efficient processes. I thrive in dynamic environments where my ability to quickly master and deploy new skills directly impacts project delivery and client satisfaction.
Main technologies
3 years
2 Years
1 Year
2 Years
Potentially possible
Rashi Enterprise
Doing Network penetration testing , provide detail report with recommendations. Focus on Active Directory and Network share [SMB]
This is a sample report and outcome of my testing. with a recommendation , review walkthrough (POC) , summery , scope for batter understanding to a client . Focus on web app penetration testing.
Server-Side Request Forgery (SSRF) is a type of security vulnerability where an attacker can make the server-side application send HTTP requests to an unintended or malicious destination. This can lea
It will represent my work and methodology. information gathering , enumeration , Initial exploit , privilege escalation.
Bachelor of Technology (BTech) in Information Technology
2022-01-01-2024-01-01
in Information technology
2018-01-01-2021-01-01