Skip to content
View astra-11's full-sized avatar
πŸ’­
⏳ On the Cyber Grind
πŸ’­
⏳ On the Cyber Grind

Block or report astra-11

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
astra-11/README.md

πŸ‘‹ Yo, I’m Astra 🌌

I use the name Astra for my cybersecurity work β€” and Sharvari Dubey is my official identity.

This is my hacking ground β€” built to document, explore, and dominate everything cybersecurity.


πŸ’« About Me

πŸ’» Cybersecurity enthusiast, bug bounty hunter, and aspiring red teamer.
πŸ”Ž Grinding labs on TryHackMe, doing web exploitation, and solving reverse engineering tasks.
πŸš€ eJPT Certified β€” Practical, hands-on penetration testing
Β Β Β Β 
🐞 Actively participating in bug bounty programs
🌍 Looking for internships, mentorship and opportunities in offensive security
⚑ Fun fact: I love turning complex problems into exciting hacking challenges 🧩

Always learning deeper. Always breaking better. πŸ”₯


πŸ΄β€β˜ οΈ Featured Security Projects & CTF Writeups

πŸ“Œ CloudSEK Hiring CTF Writeup (2025)

Full exploitation report covering XXE, JWT tampering, MFA bypass, OSINT using BeVigil & automation πŸ‘‰ https://github.com/astra-11/CloudSEK-CTF-Writeup-2025


πŸ” VJTI Internship – Reverse Engineering

Reverse-engineering Windows binaries using Ghidra & x64dbg πŸ‘‰ https://github.com/astra-11/vjti-internship-reverse-engineering


πŸ›‘ Freelance Security Reports

Real-world assessments using Apache, Skipfish & Kali Linux πŸ‘‰ https://github.com/astra-11/freelance-security-reports


πŸ§ͺ Tutelr Cybersecurity Internship – Red Team + DFIR

Hardening, SIFT forensics, and red-team methodology reports πŸ‘‰ https://github.com/astra-11/tutelr-internship-reports


πŸ”„ More CTF writeups, tools & labs coming soon! πŸš€
Keep watching this space: https://github.com/astra-11


πŸŽ₯ I Make Cybersecurity Content

I share what I learn, solve & struggle through β€” to help others grow in hacking.

If you're starting out β€” you're not alone. Let’s grow together 🫑


🌐 Connect With Me

Platform Link
πŸŽ₯ YouTube https://www.youtube.com/@Astra-Sec
πŸ“Έ Instagram https://www.instagram.com/the_astra_sec/
πŸ•ŠοΈ X (Twitter) https://x.com/TheAstraSec
🧠 TryHackMe https://tryhackme.com/p/Sharo11
🐞 HackerOne https://hackerone.com/astra_11
πŸ” Bugcrowd https://bugcrowd.com/astra_11
πŸ’Ό LinkedIn https://www.linkedin.com/in/sharvari-dubey-806717227/
πŸ’» Dev GitHub https://github.com/Sharo-11
πŸ§‘β€πŸ’» Portfolio https://portfolio-2-0-orpin.vercel.app/

🧰 Tech Stack

Python Flask HTML5 Markdown Java


🧠 Platforms I’m Active On

  • πŸ” TryHackMe β€” Red team labs, daily rooms & OSCP-style practice
  • 🐞 HackerOne β€” Bug bounty reports and recon experiments
  • 🚩 CTFs β€” CloudSEK, Hacker101, THM, local competitions

πŸ“Š GitHub Stats


πŸ† GitHub Trophies


πŸ”₯ Hacker Journey Loading…

Made with πŸ’» + β˜• + πŸ” | Astra β€” Train. Hack. Dominate.

Pinned Loading

  1. CloudSEK-CTF-Writeup-2025 CloudSEK-CTF-Writeup-2025 Public

    Complete writeup and exploitation report for CloudSEK Hiring CTF β€” covering XXE, JWT tampering, multi-factor bypass, OSINT using BeVigil, and Python automation.

    1

  2. vjti-internship-reverse-engineering vjti-internship-reverse-engineering Public

    Reverse engineering challenges solved during my internship at the Centre of Excellence, VJTI Mumbai. Tasks involved analyzing Windows executables to determine correct input strings using tools like…