cryptossh.online Open in urlscan Pro
185.27.134.111  Public Scan

Submitted URL: http://cryptossh.online/
Effective URL: http://cryptossh.online/?i=1
Submission Tags: phish.gg anti.fish automated Search All
Submission: On October 06 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

POST https://api.web3forms.com/submit

<form action="https://api.web3forms.com/submit" method="POST">
  <div class="row d-flex justify-content-center">
    <div class="col-lg-6">
      <div class="form-floating mb-3">
        <input type="hidden" name="access_key" value="90e9e673-d9c0-4618-9831-03fbba8700cf">
        <input type="text" class="form-control" name="User-Name" id="floatingInput" placeholder="Enter Name*" required="">
        <label for="floatingInput">Enter Name*</label>
      </div>
      <div class="form-floating mb-3">
        <input type="email" class="form-control" name="User-Email" id="floatingEmail" placeholder="Enter Email*" required="">
        <label for="floatingEmail">Enter Email*</label>
      </div>
      <div class="form-floating mb-3">
        <input type="number" class="form-control" name="User-Phone" id="floatingPassword" placeholder="Enter Phone*" required="">
        <label for="floatingPassword">Enter Phone*</label>
      </div>
    </div>
    <div class="form-floating col-lg-6">
      <textarea class="form-control" placeholder="Leave a comment here" name="User-Message" id="floatingMessage" style="height: 205px" required=""></textarea>
      <label for="floatingMessage" class="px-4">Enter Message*</label>
    </div>
    <div class="col-12 mt-5 d-flex justify-content-center">
      <button class="btn btn-lg btn-outline-light" type="submit">SEND MESSAGE</button>
    </div>
  </div>
</form>

Text Content

portfolio
 * SKILLS
 * PORTFOLIO
 * ABOUT
 * CURRICULUM VITAE
 * CONTACT


HI, IM VIKAS LAHARE


BACHALOR OF COMPUTER APPLICATION


TELL ME MORE



PORTFOLIO CHATBOT





SKILLS

vikaslahare1524 [0x2]


734261 4 1


tryhackme.com

CONTINUOUSLY IMPROVING MY SKILLS AND KNOWLEDGE IN THE FIELD.


FRONT-END DEVELOPMENT

Proficient in HTML, CSS, and JavaScript. Experienced in responsive web design,
building user-friendly interfaces, and using modern frameworks like ReactJS.


BACK-END DEVELOPMENT

Skilled in server-side programming using technologies like Node.js and Express.
Experience working with databases such as MongoDB and MySQL.


MOBILE APP DEVELOPMENT

Proficient in developing mobile apps for iOS and Android using frameworks like
React Native. Experienced in building engaging and intuitive mobile user
interfaces.


CYBER SECURITY

Proficient in developing mobile apps for iOS and Android using frameworks like
React Native. Experienced in building engaging and intuitive mobile user
interfaces.


PORTFOLIO

A COLLECTION OF PROJECTS I'VE WORKED ON.


PROJECT 1

Port Scanner | Make your own port scanner.

View Full Project


PROJECT 2

Weather Fore Casting

View Full Project


PROJECT 3

Currency Converter

View Full Project
More Projects


ABOUT

LEARN MORE ABOUT ME, MY BACKGROUND, AND WHAT MOTIVATES ME.

2018-2021

EARLY PASSION FOR TECHNOLOGY

From an early age, I became fascinated with computers and programming. Starting
with basic HTML and CSS, I gradually expanded my skills to include JavaScript
and various frameworks.



2021-2024

HIGHER EDUCATION AND CAREER GROWTH

During my university years, I studied computer science and gained hands-on
experience through internships and freelance projects. This period fueled my
passion for creating innovative solutions and solving complex problems.

2024-PRESENT

PROFESSIONAL EXCELLENCE AND CONTINUOUS LEARNING

Throughout my career, I have consistently sought opportunities to refine my
skills and stay updated with the latest technologies. I strive for excellence in
every project I undertake and aim to deliver valuable and impactful results.



FUTURE

CONTINUING TO MAKE A DIFFERENCE

I am committed to leveraging my skills and expertise to contribute to meaningful
projects that have a positive impact on society. I am eager to take on new
challenges and collaborate with talented individuals to create innovative
solutions.


YOUR
NEXT
HIRE


DOWNLOAD RESUME

My name is Vikas Lahare, and I have a deep passion for technology. This
enthusiasm fuels my ambition to become an Ethical Hacker. I am dedicated to
mastering the skills necessary to protect and secure digital systems from cyber
threats. By combining my love for technology with a commitment to ethical
practices, I aim to excel in identifying vulnerabilities and enhancing security
of online enviroment.

Download


CURRICULUM VITAE

A SMALL SAMPLING OF SOME OF THE PROJECTS I'VE WORKED ON AS A STUDENT OF THE ICS
PROGRAM.


VIKAS LAHARE

 * vikaslahare1524@gmail.com
 * +91 7389301189
 * Kota, Bilaspur, Chhattisgarh

TECHNICAL SKILLS

 * HTML
 * CSS
 * JavaScript
 * Python
 * Java
 * Bash Script
 * MySQL, MongoDB & NoSql
   

PERSONAL INTERESTS

 * Cyber Security
 * CCNA
 * CCNP
   


PROFILE

--------------------------------------------------------------------------------

My name is Vikas Lahare, and I have a deep passion for technology. This
enthusiasm fuels my ambition to become an Ethical Hacker. I am dedicated to
mastering the skills necessary to protect and secure digital systems from cyber
threats. By combining my love for technology with a commitment to ethical
practices, I aim to excel in identifying vulnerabilities and enhancing security
of online enviroment.


HIGHLIGHTS OF QUALIFICATIONS

--------------------------------------------------------------------------------

 * Web Development: Proficient in building and maintaining secure web
   applications, including knowledge of common web vulnerabilities (such as SQL
   injection and XSS) and best practices for securing web applications.
 * Python Programming: Experienced in using Python for developing security
   tools, automating tasks, and analyzing data. Capable of writing scripts for
   vulnerability assessments, network security, and incident response.
 * PHP Programming: Skilled in PHP with a focus on secure coding practices.
   Ability to develop and maintain web applications while ensuring protection
   against common web-based attacks and vulnerabilities.
 * Bash Scripting: Competent in writing and utilizing Bash scripts for
   automating system administration tasks, managing security configurations, and
   conducting system monitoring.
 * Ethical Hacking: Skills in ethical hacking to identify and address security
   weaknesses. This involves understanding various hacking techniques and using
   them in a controlled and legal manner to enhance security.
 * Secure Coding Practices: Knowledge of secure coding techniques to prevent
   vulnerabilities in software development. This includes understanding common
   coding flaws and applying security best practices during development.
 * Identity and Access Management (IAM): Ability to manage user identities and
   control access to resources. This includes understanding authentication
   mechanisms, access control models, and the implementation of IAM solutions.
 * Security Operations and Management: Skills in managing and overseeing daily
   security operations, including monitoring security systems, managing security
   teams, and ensuring compliance with security policies.
 * Forensics and Investigation: Ability to collect, analyze, and preserve
   digital evidence in a way that is legally admissible. This includes
   understanding forensic tools and techniques to investigate cybercrimes and
   data breaches.
 * Network Security: Understanding how to secure networks against unauthorized
   access, attacks, and other threats. This includes knowledge of firewalls,
   intrusion detection systems (IDS), and intrusion prevention systems (IPS).
 * Cryptography: Knowledge of encryption methods and protocols to protect data
   integrity and confidentiality. This includes understanding how to implement
   and manage encryption technologies and digital certificates.
 * Threat Intelligence: Skills in gathering, analyzing, and interpreting threat
   data to identify potential threats and vulnerabilities. This includes staying
   informed about emerging threats and understanding how to apply threat
   intelligence to improve security posture.
 * Penetration Testing: Proficiency in simulating attacks to find and fix
   security vulnerabilities before malicious hackers can exploit them. This
   involves using various tools and techniques to test and assess the security
   of systems and networks.
   


EDUCATION

--------------------------------------------------------------------------------

2021 - 2024 DR. C.V. RAMAN UNIVERSITY Bachelor of Computer Applications


ADDITIONAL COURSES & TRAINING

--------------------------------------------------------------------------------

Cyber Security Self Training CCNA CCNP


CERTIFICATION

A COLLECTION OF PROJECTS I'VE WORKED ON.



❮ ❯



CONTACT ME

INTERESTED IF I'D BE THE RIGHT FIT FOR YOUR TEAM? FILL IN THIS FORM AND I WILL
RESPOND WITHIN 24-48 HOURS.

Enter Name*
Enter Email*
Enter Phone*
Enter Message*
SEND MESSAGE

Copyright © 2024 Vikas Lahare