I am Shanavas Shafi

Name: Shanavas Shafi

Profile: Ethical Hacker

Email: shanavasshafi07@gmail.com

Phone: +91 6238262961

Skills
Python 100%
Linux 90%
Network Scanning 80%
Vulnerability Assessment 90%
Penetration Testing 85%
PowerShell 80%

About me

My transition from nursing to cybersecurity started when I realized that my real interest was always in technology and problem-solving. Even during my GNM studies, I was more drawn to computers, networks, and how systems function behind the scenes. Nursing taught me discipline, patience, and responsibility—qualities that naturally support a career in cybersecurity.

As I stepped into cybersecurity, I focused on building strong fundamentals: networking, Linux, Python, reconnaissance, packet analysis, and report writing. Tools like Kali Linux, Nmap, tcpdump, and basic scripting helped me understand how attacks happen and how systems can be secured. Each new concept increased my curiosity and pushed me to learn more with consistency.

Today, I am dedicated to becoming a skilled penetration tester. I enjoy hands-on practice, technical communication, and breaking down complex topics into simple explanations. This journey reflects my passion, my dedication, and my commitment to growing every day in cybersecurity.

Resume

A dedicated learner building a solid foundation in cybersecurity, programming, and ethical hacking.

Sumary

Shanavas Shafi

Dedicated learner transitioning from a nursing background into cybersecurity with strong discipline, focus, and analytical thinking. Building solid foundations in networking, Linux, Python, and cybersecurity fundamentals through continuous hands-on practice. Passionate about ethical hacking, problem-solving, and developing technical skills to become a professional penetration tester.

  • Kochi, Kerala, India
  • +91 6238262961
  • shanavasshafi07@gmail.com

Education

Higher Secondary Education (Science Stream)

2019 - 2021

Government Higher Secondary School, Kallar, Idukki

Passed with 94% and developed strong analytical and scientific reasoning skills.

General Nursing & Midwifery (GNM)

2022 - 2025

Government School Of Nursing, Idukki

Completed comprehensive nursing training while discovering a deep interest in technology. Learned discipline, teamwork, documentation, and time management, which now support my cybersecurity learning.

Professional / Learning Experience

Cybersecurity Learner & Red Team Aspirant

2025 - Present

Kochi, Kerala, India

  • Practicing reconnaissance, scanning, vulnerability assessment, and reporting.
  • Hands-on experience with Nmap, Nikto, tcpdump, Kali Linux, VirtualBox, and Linux networking.
  • Understanding ethical hacking phases including information gathering, exploitation, and documentation.
  • Building strong networking fundamentals: IP addressing, OSI model, ports, protocols, and packets.
  • Learning Python for automation and basic cybersecurity scripting.

Cybersecurity & Programming Journey

2025 - Present

Kochi, Kerala, India

  • Built a strong foundation through CS50 Cybersecurity and CS50 Python, focusing on core security concepts.
  • Gaining hands-on experience with networking fundamentals, Linux commands, virtualization, packet analysis.
  • Practicing ethical hacking techniques such as reconnaissance, vulnerability scanning, basic exploitation etc
  • Strengthening scripting skills with Python to automate tasks.

What I Can Do

Practical skills and services I provide as part of my journey into cybersecurity and ethical hacking.

Vulnerability Scanning & Basic Security Audits

I perform basic vulnerability scans using tools like Nessus, Nmap, and OpenVAS, identifying security weaknesses and providing simple improvement recommendations.

Linux System Configuration & Hardening

Experienced in using Linux (especially Kali). I can configure systems, manage permissions, install tools, and apply basic security hardening practices.

Network Analysis & Packet Inspection

Skilled in analyzing network traffic using tools like tcpdump and Wireshark (soon), understanding network behavior, and detecting suspicious patterns.

Python Scripting & Automation

I write simple automation scripts in Python for cybersecurity tasks like reconnaissance, log analysis, and small utilities.

Web Reconnaissance & OSINT

Conducting web enumeration, subdomain discovery, metadata extraction, and information gathering using OSINT techniques.

Penetration Testing

Practicing ethical hacking techniques like reconnaissance, vulnerability assessment, exploitation basics, and report writing.

1

Lab

4

Projects

720

Hours Of Learning

20+

Tools

Portfolio

Showcasing my labs, projects, certifications, and courses as I grow in cybersecurity.

  • All
  • CyberLabs
  • Projects
  • Certificates
  • Courses Completed

Penetration Testing Home Lab

CyberSecurity Lab Using Kali Linux & Metasploitable 2

Continous-Calculator

Fully Functionable Calculator Made With C

Introduction To Python

EC-Council Python For Beginners

Harvard CS50 Introduction To Cybersecurity

Studied core cybersecurity principles including threat analysis, network security, cryptography, incident response, and secure coding

Introduction To Dark Web, Anonymity & Cryptocurrency

EC-Council Short Course About Dark Web

CyberSecurity Challenge

A comprehensive cybersecurity learning path including networking, Linux, ethical hacking, tools, and hands-on labs designed to prepare for entry-level security positions.

Cybersecurity For Business, Fundamental Edition

EC-Council Course About Importance of Cybersecurity in Business

Harvard CS50 Introduction to Programming Using Python

A foundational programming course from Harvard covering core Python concepts through hands-on problem sets and real-world applications.

Frequently Asked Questions

Quick answers to the most common questions about my cybersecurity journey, tools, and hands-on experience.

1. What cybersecurity domains are you currently focusing on?

I am currently developing expertise in penetration testing, networking fundamentals, Linux administration, reconnaissance methodologies, vulnerability assessment, and basic exploitation workflows.

2. What tools do you primarily work with?

I actively work with Nmap, Wireshark, tcpdump, the Metasploit Framework, Subfinder, Assetfinder, Recon-NG, and various Kali Linux reconnaissance and enumeration utilities.

3. Do you have hands-on lab experience?

Yes. I have completed a structured home-lab project using Kali Linux and Metasploitable2, performing end-to-end reconnaissance, scanning, enumeration, exploitation, and report documentation.

4. Are you open to internships or collaborations?

Yes. I am actively pursuing cybersecurity internship opportunities and open to meaningful collaborations that support learning and practical skill development.

5. How can someone contact you for cybersecurity work?

You may reach me through the contact section of this website or via email at shanavasshafi07@gmail.com.

Contact Me

Whether it's cybersecurity projects, collaborations, or general inquiries, I'm always open to connect.

Address

Kochi, Kerala, India

Call Me

+91 6238262961

Email Me

shanavasshafi07@gmail.com

Loading
Email Not Sent
Your message has been sent. Thank you!