Qadir Bux

Information Security Analyst | VAPT Specialist | Penetration Tester

Dedicated third-year IT student with expertise in Cybersecurity, VAPT, and Cryptography, backed by global certifications. Skilled in problem-solving and innovation, seeking a role to enhance organizational security through advanced assessment and defense strategies.

01101001 01101110 01100110 01101111 01110011 01100101 01100011

About Me

I am a passionate Cybersecurity professional with a strong focus on Vulnerability Assessment and Penetration Testing. My expertise extends to cryptography, secure coding practices, and network security.

Currently pursuing my BS in Information technology Engineering, I am constantly expanding my knowledge and skills in the rapidly evolving field of information security.

Qadirshar66@gmail.com
+92 3063355725
Nawabshah,Sindh, pakistan

My Skills

Security

Cybersecurity
VAPT
Ethical Hacking
Cryptography
Network Security

Programming & Scripting

Bash
PowerShell
Java
Python
C
C++

Tools & Technologies

AWS
MySQL
Oracle SQL
GitHub

Projects

ShadowHash

All in One Crypto Solution with a self-developed ShadowHash Algorithm, offering encryption, breach detection, password generation, hash creation, comparison and malware scanning across 28 webpages.

Java HTML CSS JavaScript

SecureKeyGen

Robust cryptographic key generator built in Java, utilizing PBKDF2, XOR operations, and multi-layered encryption (AES, 3DES, Blowfish) to generate secure, unpredictable keys for encryption.

Java Cryptography Security

PixelPhantomX

Adversarial image obfuscation tool that generates ghost images using noise injection, edge distortion, metadata poisoning, and watermarking to prevent unauthorized use in AI training.

Python Computer Vision AI Security

SteganoX

A steganography tool enabling users to hide and extract secret messages from images, featuring command-line interface, interactive mode, and lightweight encoding/decoding. Available on PyPI.

Python Steganography PyPI

ShadowShell

Python-based reverse shell for ethical hacking and penetration testing, offering persistence, keylogging, screenshot capture, file transfer, and stealth remote control over compromised systems.

Python Security

AWS-ScriptEngine

A collection of Bash and PowerShell scripts for automating AWS tasks, including CLI setup, S3, EC2, and DynamoDB management, streamlining cloud operations for Linux and Windows users.

PowerShell Bash AWS

Port Scanner

Python-based port scanner that detects open ports on single or multiple IPs, supports custom port ranges, uses socket timeouts for efficiency, and provides color-coded output.

Python Network Security Socket Programming

Handwritten-Digit-Recognition

This project implements a state-of-the-art digit recognition system trained on the MNIST dataset, achieving >98% accuracy. It features:

Python ML Data

Experience

Security Analyst

Co

Jan 2025 – Mar 2025
  • Conducted vulnerability assessment and penetration testing using tools like Nessus and Acunetix
  • Performed manual testing to identify security vulnerabilities in web applications
  • Managed AWS IAM configurations and enhanced cloud security posture
  • Documented findings and provided remediation recommendations to clients

Education

BS in Information Technology Engineering

SBBUVAS Sakrand

2024 – 2028

Class XII

Ever Shine Collage Ranipur

2023

Percentage: 88.8%

Class X

Ever Shine school Ranipur

2021

Percentage: 93.8%

Certified Ethical Hacker (CEH)

EC-Council

CompTIA Security+

CompTIA

Professional Certificate Program in Cybersecurity

Google- Coursea

Systems and Usable Security (Elite Silver)

Self

Web Application Scanning

Self

Networking Basics & Introduction to Packet Tracer

Cisco NetAcad

AWS Certified Cloud Practitioner

Amazon Web Services

API Fundamentals Student Expert

Postman

Python Course (PITP Nawabshah)

IBA — Quest

Achievements

Scopus-indexed Book Chapter

"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025

Book Chapter Submission

"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"

Publications in InfoSec WriteUps and System Weakness

Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness

Trainings & Courses

Forage Cybersecurity Job Simulator

  • MasterCard

AWS Educate - Getting Started with Security

  • Specialized training in AWS IAM and security services
Penetration Tester
  • Web Fundamentals
  • Microsoft Learn Security

    • SC-200: Configure Microsoft Sentinel environment
    • Linux command line and Shell
    • Introduction to GitHub

    SimpliLearn Training

    • Introduction to Cyber Security
    • Linux Training

    Cisco NetAcad

    • CCNA v7: Introduction to Networks Training

    Udemy Security Courses

    • Complete Ethical Hacking Bootcamp
    • Complete Ethical Hacking Course With ParrotOS 2025

    EC-Council CodeRed

    • Top 100 Interesting Bugs
    • Getting Started with IoT Security
    • Introduction to Web Forensics
    • Cybersecurity: Cloud Security

    Articles

    Pixel Poisoning: Hacking Generative AI

    Pixel Poisoning: Hacking Generative AI

    A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.

    Read More
    SQL Injection Exploitation with SQLMAP

    SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAP

    Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.

    Read More
    Wi-Fi Hacking & Protection with Aircrack-ng

    The Art of Wi-Fi Hacking & Protection with Aircrack-ng

    A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.

    Read More

    Get In Touch

    Email

    Qadirshar66@gmail.com

    Phone

    +92 3063355725

    LinkedIn

    Connect with me