I’m Shadow (XaeDor), a skilled ethical hacker specializing in penetration testing (VAPT), red team operations, and high-impact bug bounty hunting. My expertise lies in identifying critical vulnerabilities, delivering precise, evidence-based reports, and collaborating with teams to implement robust security fixes. Beyond cybersecurity, I craft sleek, high-performance websites using JavaScript, CSS, and HTML, blending technical precision with creative design to create seamless user experiences.
Online: Shadow
Shadow aka XaeDor
Ethical Hacker · Pentester · Bug Bounty Hunter
security research & bug bounty
Hi — I'm Shadow
aka XaeDor
I hunt web vulnerabilities, analyze auth logic, and craft remediation-first reports. I develop tools to streamline triage and deliver secure proof-of-concepts for responsible disclosure.
About Me
Skills
Tools
- Burp Suite
- Nmap
- ZAP Proxy
- Nessus
- Nikto
- Metasploit
- Wireshark
- John the Ripper
- Hydra
- Sqlmap
Languages
- Python
- Bash
- C
- HTML & CSS
- JavaScript
- PHP
- SQL
- Java
- Rust
Expert In
- Ethical Hacking
- VAPT
- Linux
- Cybersecurity
- Bug Bounty
- Red Teaming
- Network Security
- Web Application Security
- Cloud Security
- Mobile Security
Contact
If you want to Contact Me, request a collaboration, or hire for a pentest Or Bug Hunting — please DM me on Instagram with scope and preferred secure channel. Alternatively, use the form below (emails will be sent to XaeDor).
Form powered by Web3Forms.
Resume
Professional Summary
Objective
Driven to excel in a cybersecurity team, harnessing advanced VAPT and red teaming expertise to uncover vulnerabilities, neutralize threats, and fortify systems with cutting-edge security solutions.
Certifications
- C Programming
- Linux
- Computer Networking
- Cyber Security
- Ethical Hacking
- Google Cybersecurity
Technical Skills
- C Language: Syntax, control structures, pointers, file handling.
- Cybersecurity: CIA triad, threat analysis, encryption, OWASP top 10.
- Networking: Network types, devices, protocols, OSI model.
- Linux: CLI, virtualization, permissions, networking, firewall.
- Ethical Hacking: Phases, FootPrinting, scanning, VAPT.
- Tools: Nmap, Burp Suite, Zaproxy, Nikto, Nessus, Metasploit.