Nikhil Shingade ethical hacker

Maharashtra India.
 Nikhil Shingade Profile

Nikhil Shingade

Hack It Yourself Before you get Hacked.!

  • EMAIL :

About me


Nikhil Shingade is Information Security & Cyber Crime Consultant. During his graduation at Pune University, He developed projects like SMS Based Control System, Face Recognition Based Control System exhibiting his sharp acumen for technology. At Age of 20, Nikhil exposed loopholes like SMS & Call Forging (VOIP) in Mobile Networks. The technology that allowed sending SMS or Make Call to any Number from any number of your choice. At Present, He is Founder & Director at Cybergravity Solutions, chief Technical Officer at Hackbraianinfo Pvt. Ltd. and Technical Head and Project Manager in Ignicia Technologies Pvt. Ltd. which is rapidly growing security services & investigation consulting organization focusing on Cyber Crime Investigations, Cyber Law Consulting, Vulnerability Assessment & Penetration Testing, and Information Security Training. He delivered workshop and expert session on cyber security in different colleges. He is Certified Ethical Hacker (CEHV9) and also did VAPT in Delhi. .

Security Expert
Cyber Foreinsic Investigatior
Corporate Trainer

Work Experience


1. Founder & Director At Cybergravity Solutions

2. chief Technical Officer At Hackbraininfo Pvt. Ltd.

3. Technical Head & Project Manager At Ignicia Technologies Pvt.Ltd.

Cyber Security
June 2015 - PRESENT

Cybergravity Labs is an information security based innovation center developed by Cybergravity Labs Solutions based out of Mumbai, India. It is also trusted cyber security partner of some of the leading enterprises.

  • Delivered workshop and seminar in different collegs.
  • Provide corporate training in different software or IT companies.
  • Reserach on new technology to enhance cyber security domain.

Work Skills

Technical Knowledge
1.Vulnerability Assessment
2.Forensic Investigation.
3.Network Security.
4.Computer & cybersecurity.
5.Operating System.
6.Web Application Security.
7.Security Audting.
8.Web Development.
9.Cloud Computing.
10.Internet of Things.
11.Database Development & Security.
12.Code Review & Reverse Engineering.
13.Firewall,IDS,IPS & Honeypot Configuration.
15.Metasploit Framework.
17.Mobile Application Security Testing.
18.Kali Linux.
19.Linux Administration.
20.Blockchain Cryptocurrency.
21.Bug Bounty.
22.Malware Analysis & Prevention.
23.Mobile Networks
24.Data Analysis
25.VAPT Reporting.

Education & Certifications




I completed my graduation from (Government College of Engineering and Research Awasari Pune)in Computer Engineering Department. I passed my graduation with 65% marks. We made project in last year name as "BIOMETRIC SYSTEM FOR ONLINE WEBSITE SECURITY". My educational experience includes a recently completed college degree- which contributed greatly to my development of skills such as Cybersecurity and software development. I noticed that the job posting listed these as essential skills for the position. The classes I took and projects I completed were for a technology major and they imparted many of the concepts necessary to understanding good technology.My educational background has prepared me well for this position and for a successful career path. I also plan to pursue further coursework in the future in order to keep learning and gain the qualifications to advance in this field.

COURSE ON Cyber abvSecurity

Certified Information Security Expert
Cybercure Solutions PVT. LTD DELHI(3 MONTHS)

Certified Information Security expert is the 3 months training course provided by Cybercure solutions pvt ltd. delhi. In this course, a complete detailed study of each and every topic in the information security and ethical hacking course are taught by expert professionals, working regularly on cyber security and information security projects and having wide experience in this field..

COURSE ON Cyber Security

Certified Ethical Hacker V9

EC-Council was formed as the result of very disheartening research after the 9/11 attack on the World Trade Center. Founder, Jay Bavisi, after watching the attacks unfold, postured the question, what if a similar attack were to be carried out on the Cyber battlefield? Would the information security community have the tools and resources at their disposal to thwart such an attack? At that time, the answer was no. EC-Council, officially incorporated as the International Council of E-Commerce Consultants was formed to create information security training and certification programs to help the very community our connected economy would rely on to save them from a devastating Cyber Attack. EC-Council rapidly gained the support of top researchers and subject matter experts around the world and launched its first Information Security Program, the Certified Ethical Hacker. With this ever-growing team of subject matter experts and InfoSec researchers, EC-Council continued to build various standards, certifications and training programs in the electronic commerce and information security space..

COURSE ON Cyber abSecurity

Vulnerability Assessment % Penetration Testing
Cybercure Solutions PVT. LTD DELHI(4 MONTHS)

A penetration test is done to evaluate the security of a computer system or network by simulating an attack by a malicious user / hacker. The process involves active exploitation of security vulnerabilities that may be present due to poor or improper system configuration, known and / or unknown hardware or software flaws, or operational weaknesses in process or design. This analysis is carried out from the position of a potential attacker, to determine feasibility of an attack and the resulting business impact of a successful exploit. Usually this is presented with recommendations for mitigation or a technical solution.

COURSE ON Cyber Forensics Investigation

Computer and Digital Forensic

A Computer Forensics Investigator or Forensic Analyst is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers and other types of data storage devices. Equipment can often be damaged either externally or internally corrupted by hacking or viruses. The Forensic Analyst is most well known for working within the law enforcement industry; however, he or she can also be tasked to test the security of a private company’s information systems. The Analyst should have an excellent working knowledge of all aspects of the computer including but not limited to hard drives, networking, and encryption. Patience and the willingness to work long hours are qualities that are well-suited for this position.