Online: Shadow
Shadow aka XaeDor
Ethical Hacker · Pentester · Bug Bounty Hunter
security research & bug bounty

Hi — I'm Shadow
aka XaeDor

I hunt web vulnerabilities, analyze auth logic, and craft remediation-first reports. I develop tools to streamline triage and deliver secure proof-of-concepts for responsible disclosure.

About Me

I’m Shadow (XaeDor), a skilled ethical hacker specializing in penetration testing (VAPT), red team operations, and high-impact bug bounty hunting. My expertise lies in identifying critical vulnerabilities, delivering precise, evidence-based reports, and collaborating with teams to implement robust security fixes. Beyond cybersecurity, I craft sleek, high-performance websites using JavaScript, CSS, and HTML, blending technical precision with creative design to create seamless user experiences.

Skills

Tools

  • Burp Suite
  • Nmap
  • ZAP Proxy
  • Nessus
  • Nikto
  • Metasploit
  • Wireshark
  • John the Ripper
  • Hydra
  • Sqlmap

Languages

  • Python
  • Bash
  • C
  • HTML & CSS
  • JavaScript
  • PHP
  • SQL
  • Java
  • Rust

Expert In

  • Ethical Hacking
  • VAPT
  • Linux
  • Cybersecurity
  • Bug Bounty
  • Red Teaming
  • Network Security
  • Web Application Security
  • Cloud Security
  • Mobile Security

Contact

If you want to Contact Me, request a collaboration, or hire for a pentest Or Bug Hunting — please DM me on Instagram with scope and preferred secure channel. Alternatively, use the form below (emails will be sent to XaeDor).

Form powered by Web3Forms.

Resume

Professional Summary

Objective

Driven to excel in a cybersecurity team, harnessing advanced VAPT and red teaming expertise to uncover vulnerabilities, neutralize threats, and fortify systems with cutting-edge security solutions.

Certifications

  • C Programming
  • Linux
  • Computer Networking
  • Cyber Security
  • Ethical Hacking
  • Google Cybersecurity

Technical Skills

  • C Language: Syntax, control structures, pointers, file handling.
  • Cybersecurity: CIA triad, threat analysis, encryption, OWASP top 10.
  • Networking: Network types, devices, protocols, OSI model.
  • Linux: CLI, virtualization, permissions, networking, firewall.
  • Ethical Hacking: Phases, FootPrinting, scanning, VAPT.
  • Tools: Nmap, Burp Suite, Zaproxy, Nikto, Nessus, Metasploit.