Skip to content
View 5h4rk-lab's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Highlights

  • Pro

Block or report 5h4rk-lab

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
5h4rk-lab/README.md

Go Charan Kilaru | Security Engineer

typing headline

Portfolio Email LinkedIn Twitter

Visitors


๐Ÿ›ก๏ธ About

Security Engineer (Application & Cloud) focused on threat modeling, secure design/code review, CI/CD security guardrails (SAST/DAST), incident response, and network security.
๐ŸŽ“ M.S. Cybersecurity @ University of Delaware (GPA 3.96) โ€” research on secure EV charging protocols (LIN-CP) & embedded security.

  • Built secure boot + signed firmware for EVSE controllers; integrated memory-safety tooling & PR gates.
  • Shipped cloud telemetry (AWS/GCP) with least-privilege IAM, secrets/KMS, audit logging, anomaly detection.
  • Reported 80+ critical vulns (XSS, SSRF, RCE) via bug bounty programs.

Motto: Build it secure. Break it better. Fix it faster.


โš™๏ธ Stack & Tools

Security focus: Application Security, Cloud Security, Secure SDLC, Threat Modeling, Network Security, Secure Code Review, VAPT, API Security, Risk Assessment, IAM / Secrets / KMS, SIEM / IDPS, Incident Response, Digital Forensics


๐Ÿ“Š Stats


๐Ÿ† Certifications
  • CEH โ€“ Certified Ethical Hacker
  • GCP Professional Cloud Security Engineer
  • CRTP โ€“ Certified Red Team Professional
  • eJPT โ€“ INE Junior Penetration Tester
๐Ÿ“š What I Actually Do
  • Design: Threat models, security architecture reviews, secure SDLC guardrails
  • Build: IaC & pipelines for SAST/DAST, secrets management, IAM boundaries
  • Break: Pentesting (web/mobile), misuse cases, fuzzing, reverse engineering
  • Respond: Alert triage, incident RCA, tabletop exercises
  • Enable: Security playbooks, developer training, documentation

๐Ÿ›ฐ๏ธ Contact

mario-runner

Pinned Loading

  1. CTF-resource CTF-resource Public

    This help a biggener CTF player with some knowledge when he is struck!

    JavaScript 2 3

  2. Spotify-clone Spotify-clone Public

    This is a spotify clone developed using tailwindcss nextjs,middleware and debounce for audio control.

    JavaScript 1 1

  3. King-of-the-hill King-of-the-hill Public

    Forked from holmes-py/King-of-the-hill

    This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.

  4. CRTP-CMD-Cheetsheet CRTP-CMD-Cheetsheet Public

    Command cheet sheet for CRTP-pentester_academy

    2