Skip to content
View 0xDTC's full-sized avatar
:shipit:
:shipit:

Highlights

  • Pro

Block or report 0xDTC

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xDTC/README.md

Profile Owner

👋 Hi there! Meet Tanveer Singh (also known as Divine Clown). Tanveer is a seasoned Security Engineer with a passion for cybersecurity. With over 10 years of self-learning and more than 2 years of corporate experience, he has developed a strong proficiency in:

  • Web Security Assessment
  • API Testing
  • Network Testing
  • AWS Cloud Security
  • AI LLM Testing
  • Penetration Testing

Tanveer thrives both independently and within collaborative, open-minded teams. Currently, he’s contributing his expertise to a talented group of professionals. His dedication to continual learning, combined with his commitment to excellence, makes him a valuable asset in any security-focused role. Known for his friendliness and dedication, Tanveer is not only a reliable teammate but also an ideal candidate for roles that require hard work and strategic thinking.


Professional Experience

Year Company Role Key Responsibilities Location
2022 – Present Monotype Solutions India Private Limited Security Engineer - Conducted penetration tests on APIs, web applications, networks, and cloud infrastructure, including AI LLM integrations.
- Developed threat models to identify attack vectors.
- Crafted and executed mitigation plans to meet SLAs and reduce attack surfaces.
- Acted as a security coordinator to prioritize findings and facilitate threat modeling.
- Led vulnerability scans for early detection and rapid remediation.
Impact: Enhanced security maturity, promoted proactive awareness, and implemented vulnerability management processes.
Noida, India
2018 – 2022 Confidential Clients (ERP, Hospital Network, E-commerce) Penetration Tester - Performed advanced penetration tests on web applications and networks, identifying vulnerabilities like XSS, IDOR, and authentication bypasses.
- Leveraged tools like Burp Suite, Acunetix, Nessus, OWASP ZAP, and Metasploit for vulnerability scans and threat exploitation.
- Provided stakeholders with actionable recommendations and secure coding guidance.
- Collaborated with development teams following OWASP standards to enhance security practices.
- Mentored junior IT team members, introducing automated testing frameworks for efficient assessments.
US, India

Education

Year Institution Course
2018 – 2021 Chandigarh Group of Colleges Bachelor of Computer Applications
2017 – 2018 ATL Education Diploma in Information Security (6 months)
2014 – 2016 Guru Nanak Khalsa School High School Studies (+2)

Skills

Technical Skills Subject Matter Expertise Tools (DAST, SAST) Operating Systems Scripting Languages
Security Assessment Invicti Metasploit Linux Bash
Penetration Testing Tenable.io Webapp Burp Suite Windows Python
Web Application Testing Burp Suite Pro and Enterprise Nmap Mac Shell
Thick Client (Mac/Windows) Bitsight Nikto
Threat Modeling Security Scorecard Sqlmap
API Testing Kali Linux Open Source Checkmarx (SAST & SCA)
Network Testing Checkmarx SAST Tenable
AI LLM Testing Checkmarx SCA Nessus
Postman

Interests

  • Mentoring aspiring security professionals
  • Participating in hacking Capture The Flag (CTF) events
  • Traveling for work and exploring new places
  • Gaming and enjoying digital challenges
  • Continuously learning and exploring new cybersecurity concepts
  • Sharing and gaining knowledge over social media platforms

Pinned Loading

  1. 0xCloudFlare 0xCloudFlare Public

    Shell

  2. Chamilo-LMS-CVE-2023-4220-Exploit Chamilo-LMS-CVE-2023-4220-Exploit Public

    Refurbish Chamilo LMS CVE-2023-4220 exploit written in bash

    Shell

  3. Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564 Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564 Public

    Refurbish exploit in bash

    Shell

  4. SQLPad-6.10.0-Exploit-CVE-2022-0944 SQLPad-6.10.0-Exploit-CVE-2022-0944 Public

    Refurbish

    Shell

  5. WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425 WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425 Public

    CVE-2023-41425 Refurbish

    Shell

  6. Hosts-Manager-Linux Hosts-Manager-Linux Public

    Shell