Skip to content
View mihir-shah99's full-sized avatar
🏠
Working from home
🏠
Working from home

Highlights

  • Pro

Organizations

@ForgeCloud

Block or report mihir-shah99

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mihir-shah99/README.md

πŸ‘‹ Hi there, I'm Mihir Shah

Profile Views GitHub Followers LinkedIn Twitter

πŸ“š About Me

I'm Mihir Shah, author of the Cloud Native Software Security Handbook. With a passion for cloud-native technologies and software security, I bridge the gap between innovative development practices and robust security measures. I’m dedicated to continuous learning, sharing knowledge, and contributing to the tech community.

πŸ› οΈ Skills & Expertise

AWS Azure GCP Python Go JavaScript TypeScript Kubernetes Docker Terraform Jenkins DevSecOps Threat Modeling

πŸ“– Publications

A comprehensive guide to securing cloud-native applications, covering best practices, tools, and strategies to safeguard your software in today's dynamic cloud environments.

Cloud Native Software Security Handbook

🎀 Speaking Engagements

Speaker

I’ve delivered talks at various conferences and meetups on topics such as:

  • Cloud Native Security
  • DevSecOps Integration
  • Microservices Architecture
  • Kubernetes Security Best Practices

πŸ’Ό Projects

The Next Generation of Two-Factor Authentication.

Touch2FA

Learn about Android Security, by trying out the CTF challenges in this intentionally vulnerable app.

VulnDroid Security Toolkit

Contributing to various open-source projects to foster community-driven development.

Top Langs

πŸ“ˆ GitHub Stats

Mihir's GitHub Stats

πŸ“ Blog

I regularly write about cloud-native technologies, software security, and industry best practices.

πŸ“« Get in Touch

I'm always open to connecting with like-minded professionals and enthusiasts. Feel free to reach out via:

Email LinkedIn Twitter

Popular repositories Loading

  1. VulnDroid VulnDroid Public

    CTF Style Vulnerable Android App

    Java 10 5

  2. Learning-Linux Learning-Linux Public

    Interactive Linux learning tutorial, making terminal on steroids

    Python 5

  3. KubeToDo KubeToDo Public

    To Do application deployed Kubernetes

    JavaScript 1

  4. Image-Steganography Image-Steganography Public

    This repository contains python code and a bmp image and different algos to perform steganography. i.e to feed and retrieve data from an image.

    Python 1

  5. Clair-Config Clair-Config Public

    This contains the required YAML to 'docker-compose up' Clair to start scanning vulnerable images from your own private docker registry created by the docker-compose.yaml

    1

  6. k8s-Automation k8s-Automation Public

    Automate your deployment of a k8s cluster and scale the nodes on-the-go

    Shell