shibly@security:~

$ whoami

_

Cybersecurity Analyst

Cybersecurity graduate with practical experience in vulnerability assessment, network traffic analysis, and enterprise security testing. I focus on understanding how threats operate and how systems can be monitored, hardened, and defended in real environments.

Scroll

// ABOUT_ME

Noor Elahi Ali Shibly

Hi, I’m Noor Elahi Ali Shibly, a software engineering graduate with a strong focus on cybersecurity and penetration testing.

My path into security didn’t start in a lab — it started with design. I began my tech journey as a graphic designer and Envato Author, which taught me attention to detail and how systems are structured visually. At university, that curiosity evolved into programming, where I built desktop applications using Java Swing and web applications with Spring Boot. Over time, I became more interested in what happens under the hood — and eventually, how systems fail.

That curiosity led me into ethical hacking, network security, and digital defense. I spend most of my time working in lab-based and virtual environments, testing systems, analyzing vulnerabilities, and learning how real-world attacks work. I regularly use tools like Kali Linux, Nmap, Metasploit, Wireshark, and Python-based scripts to automate and understand security workflows.

I’ve also had the opportunity to gain hands-on exposure to enterprise security assessments through training with Mohammad Shahadat Hossain, Principal Security Architect at Grameenphone Ltd., where I worked on TCP/SSL vulnerability assessments, identifying issues such as deprecated TLS configurations and SWEET32 vulnerabilities.

My current interests include offensive security, vulnerability assessment, network and cloud security, and Infrastructure as Code (IaC) security. I enjoy breaking down complex security problems, documenting what I learn, and building small tools and labs that connect theory with real systems.

I believe strong security starts with understanding how software is built — and how it can be misused. That mindset continues to guide how I learn, test, and improve as a security practitioner.

1,280+ IPs Assessed
94% ML Model Accuracy
3.74 CGPA

// EDUCATION

B.Sc. in Software Engineering

Daffodil International University

Major: Cybersecurity

CGPA: 3.74/4.00

Relevant Coursework: Network Security, Cryptography, Secure Software Engineering

// EXPERIENCE

Network Security Assessment

Grameenphone Ltd.

Supervisor: Mohammad Shahadat Hossain (Incident Response Manager)

  • Executed TCP/SSL vulnerability assessment on 1,280+ enterprise IPs
  • Identified critical vulnerabilities including deprecated TLS versions and SWEET32 (CVE-2016-2183)
  • Performed network reconnaissance, discovering 152 live hosts using Masscan and Nmap
  • Automated scanning processes with Bash scripts to improve assessment efficiency
Nmap Masscan SSL/TLS Bash

Cloud Security Research

Daffodil International University

IaC Misconfiguration Detection

Supervisor: Dr. Imran Mahmud (Dept. Head, Sr. IEEE Member)

  • Developed unsupervised ML framework to detect Terraform security misconfigurations
  • Achieved 94% ROC-AUC with Autoencoder, 94.9% PR-AUC with Isolation Forest
  • Engineered 22 security features from AWS S3 bucket configurations
  • Created explainable visualization pipeline for CI/CD integration
Python scikit-learn Terraform AWS

Research contributed to IEEE conference submission

// PROJECTS

LiteRecon_AI

Automated Reconnaissance Platform

Full-stack reconnaissance platform that streamlines penetration testing workflows with AI-powered analysis and automated reporting.

  • Integrated 11 security tools (Nmap, SSLyze, Feroxbuster)
  • AI analysis capabilities with Ollama integration
  • Automated PDF report generation with executive summaries
Python FastAPI React Ollama

IaC-Anomaly-Detection

Cloud Security ML Framework

Unsupervised machine learning framework to detect security misconfigurations in Terraform Infrastructure-as-Code for AWS S3 buckets.

  • 94% ROC-AUC with Autoencoder model
  • Engineered 22 security features
  • Explainable visualization pipeline for CI/CD
Python scikit-learn Terraform AWS

TimerApp

Lightweight Desktop Timer

Customizable desktop timer application with modern UI, system tray integration, and optional shutdown scheduling.

  • Visual & audio alerts on timer completion
  • System tray integration with always-on-top
  • Idle transparency & shutdown scheduling
Java Swing FlatLaf Maven

NoirTrim

Video Trimmer with Fades

Cross-platform desktop application for trimming videos and adding fade-in/fade-out effects with VLC playback and FFmpeg processing.

  • Visual timeline-based trimming
  • Configurable audio/video fade effects
  • Output size estimation before export
Java vlcj FFmpeg Swing

ImageToPdfConverter

Batch Image to PDF Tool

Portable Java application that converts multiple images from a folder into a single PDF with smart sorting and annotations.

  • JPG, JPEG, PNG format support
  • Numerical filename sorting
  • Custom annotations & persistent settings
Java PDFBox Swing

// SKILLS

Security Tools

Nmap Wireshark Burp Suite SSLScan Masscan

Web Security

OWASP Top 10 SQL Injection XSS Auth Bypass

Network Security

TCP/IP Vulnerability Assessment Firewall

Programming

Python Bash Java JavaScript

Platforms

Kali Linux Ubuntu Windows

Cloud & DevSecOps

AWS S3 Terraform CI/CD

// CONTACT

contact@shibly

$ echo "Let's connect"

Interested in cybersecurity, security research, or collaboration? Feel free to reach out — I’m always open to meaningful conversations.