AVAILABLE FOR FREELANCE/ open to work

Available Freelance

Hitarth

Shah

.31

Security Analyst

Hitarth

Shah

.31

Security Analyst

BASED IN Ahmedabad, Gujarat

///BUGBOUNTY HUNTER

///Designer

+ security researcher

Hitarth

⭐️

Connect to Content

Add layers or components to make infinite auto-playing slideshows.

Shah

.31

Connect to Content

Add layers or components to infinitely loop on your page.

Security Analyst

Cyber-SEC researcher / PENXtrm

Cyber-SEC researcher - PeNxtrm


Cyber-SEC

ABOUT HITS

I’m a proactive Security Researcher and beginner ethical hacker with over a year of hands-on experience in Bug Bounty, Vulnerability Assessment, and Penetration Testing (VAPT) across web, mobile, and cloud environment's.

ABOUT HITS

I’m a proactive Security Researcher and beginner ethical hacker with over a year of hands-on experience in Bug Bounty, Vulnerability Assessment, and Penetration Testing (VAPT) across web, mobile, and cloud environment's.

ACHIEVEMENTS AND MORE

I’ve been officially acknowledged by Apple, Nokia, Blackberry, Mercedes , Ferrari, Accenture and the US Department of Defense for reporting critical security vulnerabilities, demonstrating a growing ability to help secure enterprise-grade systems.

When I’m not uncovering vulnerabilities, I enjoy playing cricket, going on trips, spending quality time with my family, and occasionally just vibing while coding my next project...

ACHIEVEMENTS AND MORE

I’ve been officially acknowledged by Apple, Nokia, Blackberry, Mercedes , Ferrari, Accenture and the US Department of Defense for reporting critical security vulnerabilities, demonstrating a growing ability to help secure enterprise-grade systems.

When I’m not uncovering vulnerabilities, I enjoy playing cricket, going on trips, spending quality time with my family, and occasionally just vibing while coding my next project...

FEATURED CASES

FEATURED CASES

FEATURED CASES

My creative spirit comes alive in the digital realm. With nimble fingers flying across the keyboard, I craft clear experiences out of nothing but ones and zeroes.

WELCOME TO THE W0RK CULTURE

WELCOME TO THE W0RK CULTURE

WELCOME TO THE W0RK CULTURE

Work process means diving headfirst into unknown systems, mapping attack surfaces, testing defenses, and breaking things methodically until every weakness is exposed—and then turning those findings into fixes that make products bulletproof.

Work process means diving headfirst into unknown systems, mapping attack surfaces, testing defenses, and breaking things methodically until every weakness is exposed—and then turning those findings into fixes that make products bulletproof.

/RECON

Attack Surface MappinNG

CONCEPT CREATION

SCRIPT & MOODBOARD

//EXPLOITATION

Vulnerability Discovery

Exploit Crafting & POC

Bypassing SECURITY

///REPORT

Root Cause Analysis

Clear Reproduction Steps

Security RecommendatiON

my

my

my

Services

Services

Services

Delivering offensive security services that go beyond surface scans. From reconnaissance to exploitation, I uncover hidden weaknesses before attackers do. I ASSASSINATE BUGS LIKE JOHN-WICK

//1

SECURITY RESEARCH
Service Image
Service Image

//2

BUG BOUNTY HUNTING
Service Image
Service Image

//3

PENETRATION TESTING
Service Image
Service Image

//4

BREW SOME SPElLS
Service Image
Service Image

blend relentless curiosity with precision. Every system I touch tells a different story — sometimes hidden in forgotten endpoints, sometimes deep in obscure protocols.

VIBING ON TALWINDERRRRRRRR'S ALBUM

I BREAK

I BREAK

I BREAK

EVOLUTIONARily

EVOLUTION

EVOLUTIONARily

TO BUILD

TO BUILD

TO BUILD

.ST—RONGER

.ST—RONGER

.ST—RONGER

About Image

MY SPOT ROOM


MY SPOT ROOM


MY SPOT ROOM


My SPOT

My SPOT room

VOICE OF HIT-ARTH

About Image
About Image

///HOVER_HITS

FOR BRANDS

More than just hacking, security research is about protecting your vision. I take ideas beyond code and into resilience—where products don’t just work, they withstand attacks. From Fortune 500s to startups, my reports have helped teams patch critical flaws before they became headlines. Whether working remotely or with direct security teams, nothing matches the rush of seeing a fix go live that protects millions of use

FOR BRANDS

More than just hacking, security research is about protecting your vision. I take ideas beyond code and into resilience—where products don’t just work, they withstand attacks. From Fortune 500s to startups, my reports have helped teams patch critical flaws before they became headlines. Whether working remotely or with direct security teams, nothing matches the rush of seeing a fix go live that protects millions of use

FOR AGENCIES

As a security researcher, I combine curiosity with precision to uncover vulnerabilities others miss. Each engagement is different sometimes it’s hours of recon, sometimes it’s tracing overlooked attack surfaces—but the outcome is always the same: clear, actionable insights that strengthen trust and security. By bringing a hacker’s mindset into the workflow, I help agencies and teams identify weaknesses before adversaries exploit them.

FOR AGENCIES

As a security researcher, I combine curiosity with precision to uncover vulnerabilities others miss. Each engagement is different sometimes it’s hours of recon, sometimes it’s tracing overlooked attack surfaces—but the outcome is always the same: clear, actionable insights that strengthen trust and security. By bringing a hacker’s mindset into the workflow, I help agencies and teams identify weaknesses before adversaries exploit them.

_H1t4Rth_$haH

7h4kcw0R_dLejy

HALL OF FAMEEEE<3

These honors underscore my commitment to delivering outstanding creative solutions.

./output/apple.com/

./output/apple.com/

Trusted By

Trusted By

International Brands

International Brands

  • [BEST SERVICE]

    Big thanks to Hitarth Shah — he helped secure our assets, found issues before attackers could, and shared solid advice to improve our overall security.

    D SAM

    ///Triager, apple sec…

  • [Fast Delivery]

    As a [CONFIDENTIAL] info sec team, we can confidently say YOUR WORK was an absolute win. YOUR sharp eye uncovered a critical IDOR, and clear, concise report made triage smooth and efficientall THANK YOUU @hits

    H1 _ANALYST_PRIVATE ..

    ///TRIAGE, CONFIDENTIAL

  • [quick response]

    Hitarth’s expertise in spotting XSS vulnerabilities gave us the confidence to patch fast and stay secure.

    BATH AND BODY WORKS

    ///TRIAGER B&BW

  • [CRTO]

    FUTURE CERTS

    TBD

    ///IN PORGRESSS HTB

  • [CPTS]

    FUTURE CERTS HERE

    TBD

    ///Team head, Bose inc

  • [MAYBE ISO>>>>]

    FUTURE CERTS HERE

    TBD

    ///IN PROGRESS…

About Image

BIG OR SMALL?

BIG OR SMALL?

BIG OR SMALL?

i HAVE A PLAN.

i HAVE A PLAN.

i HAVE A PLAN.

Research ON-Demand

Try Research

free for all

open

///to everyone

More than a job, Research is an

outlet for your work.

More than a job, web design outlet for your vision.

Single-one CLIENT PROJECT

Limited ACCESS

DETAILED POC'S AND METHODOLOGIES

COMMUNITY SUPPORT

Connect TO DISCORD SERVER

ACCESS TO MY PUBLIC GITLAB-NOTION

SECURITY ON-Demand

Try Designing

ONE TIME PAYMENT

$259*

///BUY ANYTIME

More than a Vision, web design is an

outlet for your vision.

More than a job, web design outlet for your vision.

REAL-LIFE CLIENT PROJECT

RE-TEST SUPPORT

DETAILED POC'S AND METHODOLOGIES + RED TEAMING

COMMUNITY SUPPORT

Connect TO DISCORD SERVER

ACCESS TO MY PRIVATE GITLAB-NOTION

Frequently

Frequently

Frequently

Asked Questions

Asked Question

Asked Questions

What industries do you specialize in?
What services do you provide as a researcher?
Can you share examples of your previous achievements?
How do you approach a new target or program?
Can you explain your bug hunting workflow?
What tools and setups power your workflow?
What industries do you specialize in?
What services do you provide as a researcher?
Can you share examples of your previous achievements?
How do you approach a new target or program?
Can you explain your bug hunting workflow?
What tools and setups power your workflow?
What industries do you specialize in?
What services do you provide as a researcher?
Can you share examples of your previous achievements?
How do you approach a new target or program?
Can you explain your bug hunting workflow?
What tools and setups power your workflow?

Let'S WORK

Let'S WORK

Let'S WORK

TOGETHER

TOGETHER

TOGETHER

Connect yourself

into THE BUGVERSE .

OFFENSIVE SECURITY IS

outlet for your vision.

Based in Gujarat, Ahmedabad, I’m a Security Researcher driven by curiosity and precision. My work blends ethical hacking, problem-solving, and creativity — from uncovering vulnerabilities to building secure digital experiences

Hitarth shah

Hitarth shah

Create a free website with Framer, the website builder loved by startups, designers and agencies.