┌──(root💀localhost)-[~/resume]
└─$ whoami

Touhid M Shaikh _

//Security_Researcher // Exploit_Developer // Open_Source_Contributor

IP: 127.0.0.1

STATUS: EXFILTRATING_DATA...

CERTS: OSCP | OSCE | CREST CRT | CPSA

SYSTEM.PROFILE

A cybersecurity professional with 6+ years of experience. Expert in identifying critical vulnerabilities (RCE, Auth Bypass) in hardware and enterprise software. Active contributor to Metasploit and Exploit-DB, with 10+ published exploits. Primary author of the official CIS pfSense Benchmark. Creator of 403Override-NG.

>> REVEAL_PGP_PUBLIC_KEY
-----BEGIN PGP PUBLIC KEY BLOCK-----
[INSERT_YOUR_PGP_KEY_HERE]
-----END PGP PUBLIC KEY BLOCK-----

SYSTEM.IDENTITY

SYSTEM.SPECIALIZATION

VAPT Network_Security WEB_EXPLOIT PYTHON_AUTOMATION

HONORS_&_AWARDS

CONNECT_UPLINK

📡 COMMS_STREAM (@touhidshaikh22)

[00] INTERACTIVE_SHELL

Type 'help' to view available commands.
guest@touhidshaikh.com:~$

[01] CVEs_AND_EXPLOITs

CVE-2024-43381

reNgine - Stored XSS via DNS Entry.

CVE-2021-29069

Netgear Router - Command Injection.

CVE-2018-11714

TP-Link - Authentication Bypass.

PSV-2018-0182

Netgear - Forced Logout Admin bypass.

CVE-2017-9080

PlaySMS - Remote Code Execution.

VIEW_EXPLOIT_DB

10+ total CVEs published via Exploit-DB....

[02] PUBLICATIONS_&_ARSENAL

Netgear RCE Feature // PagedOut!

Detailed technical breakdown of an unauthenticated Remote Code Execution chain discovered in Netgear WNR614.

CIS pfSense Benchmark Author

Primary author/contributor to the official CIS security configuration guide for pfSense firewalls.

Exploit-DB / Metasploit Framework

Published 10+ exploit modules for various web and network-level vulnerabilities.

ShellPop & Subzy

Co-Creator of interactive shell generator (ShellPop) and active contributor to Subzy.

[03] COMMS_TRAFFIC (Testimonials)

"It is my pleasure to recommend Touhid, as an outstanding penetration tester with exceptional expertise in Infrastructure penetration test and wireless PT. Touhid's comprehensive understanding of security vulnerabilities and adeptness in exploiting them have consistently proven invaluable. His meticulous and systematic approach to testing, demonstrating, and innovative problem-solving skills has significantly enhanced the security framework for multiple customers. I would strongly endorse Touhid, for any position requiring advanced penetration testing and exploitation skills. His contributions will undoubtedly be a significant advantage to any organization." — Adhithyan Sudhaghar @ TÜV Rheinland Group
"Touhid Shaikh is great knowlegable person who has done so much amazing things in the field of infosec , also I learned many things from him about pentesting." — Faisal @ Security Researcher

[04] LATEST_INTEL (touhidshaikh.com)

Scanning remote host for new articles...

[05] PROJECT_REPOSITORIES

403Override-NG

Advanced multi-threaded Burp Suite extension automating 401/403 bypass discovery, featuring strict Diff-engine verification and YAML configuration.

TheForbiddenFortress

Intentionally vulnerable laboratory environment designed for testing 403 bypass tools against reverse proxy discrepancies.

can-i-take-over

This lab is a dynamic environment designed for security researchers to practice identifying and claiming “dangling DNS” records

WriteupDB

At Writeup-DB, we are dedicated to enhancing the learning experience by providing a comprehensive collection of external writeups.

[06] BROADCAST_TRANSMISSIONS

Upcoming Presentation: Decrypting the JOSE Stack

A comprehensive technical deep-dive into JSON Web Token (JWT) security. Covering internal structures, signature verification attacks, access control bypasses, and enterprise-grade mitigation strategies.

Crestcon 2024: Mitigating Supply Chain Attacks: Strategies for Resilient Cybersecurity | Jun 18, 2024

I, along with my colleague, presented 'Mitigating Supply Chain Attacks: Strategies for Resilient Cybersecurity' at CRESTCon 2024 in London.

Threatcon 2023: Cybersecurity and Supply Chain Risk Management: Best Practices for Procurement | Oct 10, 2023

I presented 'Cybersecurity and Supply Chain Risk Management: Best Practices for Procurement' at Threatcon 2023 in Kathmandu, Nepal.