About
Shahmeer Amir stands as a globally recognized Entrepreneur and Ethical Hacker, awarded Entrepreneur of the year 2024 and also ranking as the third most accomplished bug hunter globally. His expertise has been instrumental in assisting over 400 Fortune companies, such as Facebook, Microsoft, Yahoo, and Twitter, in resolving critical security issues within their systems. Shahmeer's entrepreneurial ventures in the technology realm have led to the establishment of multiple startups, with his current role involving the leadership of Speeqr, and minor involvement in Veiliux and Authiun
In his capacity as the CEO of Speeqr, Shahmeer's flagship company is actively engaged in developing next-generation audio-video communication technologies. Additionally, he serves as the CEO of Veiliux, positioned as Asia's inaugural mainstream Cyber Security startup with a presence in the Asia Pacific, UAE, and the UK. Authiun, another startup under Shahmeer's leadership, offers a comprehensive password-less authentication solution tailored for the 21st century.
Furthermore, Shahmeer serves as the Cyber Security Advisor to the Ministry of Finance in the Government of Pakistan. His involvement spans various projects, including Deep Sea Tracking, Digital Transformation of Legislation, and the Digitization of Pakistani Cultural Content. As a testament to his influence in the tech industry, he holds a position on the Forbes Technology Council.
An engineer and certified Cyber Security professional with credentials from esteemed organizations like EC-Council, Mile2, SANS, among others, Shahmeer is currently exploring Blockchain technology for his doctorate. With three authored books, including "Bug Bounty Hunting Essentials," and numerous research papers, he has solidified his standing as a thought leader in the field.
Shahmeer's prominence extends to the speaking circuit, where he is a highly sought-after keynote speaker on topics such as Cyber Security, Blockchain, and various technologies. Having received invitations to over 80 conferences globally, including prestigious events like Blackhat, GiSec, FIC, AEC Alberta, and many other Global events, he continues to be a beacon of knowledge. Accepted into entrepreneurship programs at esteemed academic institutions, including Stanford, Shahmeer's prowess is further demonstrated by his proficiency in coding in 25 languages and reading code in 35, establishing him as an expert across multiple technologies in his role as CTO of companies.
Articles by M. Shahmeer
Contributions
Activity
-
Seven young Pakistanis have been honored on Forbes’ ninth annual “30 Under 30 Asia” list, which highlights 300 entrepreneurs and innovators under 30…
Seven young Pakistanis have been honored on Forbes’ ninth annual “30 Under 30 Asia” list, which highlights 300 entrepreneurs and innovators under 30…
Liked by M. Shahmeer Amir
-
It is Nordics time! Nordic IT Security Summit back again with another power packed edition. Super excited to be a speaker amongst this lot of world…
It is Nordics time! Nordic IT Security Summit back again with another power packed edition. Super excited to be a speaker amongst this lot of world…
Shared by M. Shahmeer Amir
Experience
Education
Volunteer Experience
-
Cyber Security Advisor
Cyber Security Advisor
Ministry of Finance, Government of Pakistan
-
Cyber Security
Cyber Security
Punjab Information Technology Board
-
EC Council Item Writer
EC Council Item Writer
EC-Council
-
Chapter Leader Pakistan
Chapter Leader Pakistan
OWASP Foundation
-
Judge
Judge
IEEE
-
Advisor
Advisor
Khyber Pakhtunkhwa Information Technology Board (KPITB)
Licenses & Certifications
-
eWAPT
eLearnSecurity
-
GIAC Certified Penetration Tester (GPEN)
SANS Institute
-
Certified Professional Ethical Hacker - CPEH
Mile2
-
eCPPT Gold
eLearnSecurity
-
Computer Hacking Forensics Investigator - CHFI
EC-Council
-
Certified Ethical Hacker - CEH v9
EC-Council
-
Certified Network Forensics Engineer - CNFE
Mile2
-
100W - OPSEC for Control Systems
U.S. Department of Homeland Security
-
Associate Certified Chief Information Security Officer
EC-Council
-
Certified Blockchain Professional - CBP
IIB Council
Publications
-
A Deep Dive into Bypassing Next-Gen 2FA and MFA Security Measures
The Seventeenth International Conference on Emerging Security Information, Systems and Technologies SECURWARE 2023
As businesses and organizations continue to adopt more advanced security measures to protect against cyber attacks, attackers are constantly evolving their techniques to bypass these measures. In this presentation, we will explore the latest techniques for bypassing next-generation 2FA and MFA security measures, allowing attackers to gain access to sensitive information and systems.
-
Bug Bounty for Dummies
Guftugu
This is a form of ethical hacking and bug bounty hunters look for these holes and are rewarded large amounts of money by the companies that they hack into. The Ethical Hacker's story is an amazing one and is an inspiration for all those wanting to make it in the world.
-
Bug Bounty Hunting Essentials
Packt Publishing
Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers.
This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML…Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers.
This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed.
This book will get you started with bug bounty hunting and its fundamentals. -
Bypassing two factor authentication
Shahmeer Amir
Since the dawn of the World Wide Web, attackers have been involved in discovering techniques to compromise systems. Likewise security experts have devised methods to prevent attackers from breaching into systems. Such a system is two factor authentication. Two factor authentication is a method of utilizing a handheld device as an authenticator for online portals. While most organizations consider it a secure means of authenticating their users into their portals, there are methods using which…
Since the dawn of the World Wide Web, attackers have been involved in discovering techniques to compromise systems. Likewise security experts have devised methods to prevent attackers from breaching into systems. Such a system is two factor authentication. Two factor authentication is a method of utilizing a handheld device as an authenticator for online portals. While most organizations consider it a secure means of authenticating their users into their portals, there are methods using which two factor authentication can be bypassed. The techniques for bypassing 2fa are based on abusing the design and implementation which are often not looked at by web application administrators providing a leverage for attackers to compromise user data.
-
Beginner's guide to IoT Security
Cloud Security Alliance - Utterkhand
This research paper summarizes the concept of Security flaws in IoT, covering most of the renowned devices that are available in the market. The paper covers basic architecture of IoT and aims to provide security researchers a base to continuing their research
-
Breaking the web with Logics
Getwhitehats
This research paper focuses on the Modern Business Logic flaws present in web applications that pose threat to the application. This paper covers several steps to explain the hierarchy of business logic testing methodology emphasizing on each phase separately by means of an example. It also contains several business logic flaws in that are present in today’s web applications and also an approach on developers should remediate those flaws from the web applications. The main goal of this paper is…
This research paper focuses on the Modern Business Logic flaws present in web applications that pose threat to the application. This paper covers several steps to explain the hierarchy of business logic testing methodology emphasizing on each phase separately by means of an example. It also contains several business logic flaws in that are present in today’s web applications and also an approach on developers should remediate those flaws from the web applications. The main goal of this paper is to help web application security researcher and developers differentiate between web application conventional vulnerabilities and the ones that are related to logical aspect. The purpose of writing this paper is to convince the reader that at a certain point of time in the future automated scanners will be advanced at the level that conventional vulnerabilities will not require human intervention and only Business logic vulnerabilities will be present to leverage conventional ones.
-
Modern Wireless Attacks
Hackerify
This paper explains brief overview about the Modern Attacks related to Wireless Technology that can pose a potential threat to the devices that communicate with this technology. In a brief format this paper covers several scenarios that theoretically explain the security issues of the wireless infrastructure. As noted upon all the drafted technologies there was no concept of security whatsoever until someone tries to exploits certain loopholes and succeeds or in other words does some damage. As…
This paper explains brief overview about the Modern Attacks related to Wireless Technology that can pose a potential threat to the devices that communicate with this technology. In a brief format this paper covers several scenarios that theoretically explain the security issues of the wireless infrastructure. As noted upon all the drafted technologies there was no concept of security whatsoever until someone tries to exploits certain loopholes and succeeds or in other words does some damage. As wireless enabled devices such as laptops, cellular phones, and tablets become increasingly pervasive, the demand for reliable and secure mobile computing services escalates. Over the years everything as we know it is being transformed into wireless. But so are the risks that are coming with it. Wireless technology that submissively controls our planes, phones, and computers is prone to security flaws. The research paper covers overall studies that relate to common wireless device flaws in very simple explanation.This paper visualizes theoretical studies on how devices as cast as airplanes and as small as cellphones are vulnerable to wireless attacks.
-
SCADA Hacking and Awareness
Usman Institute of Technology
SCADA Hacking and Awareness was a research idea presented at Usman Institute of Technology that converged the focus of emerging vulnerabilities in SCADA systems that are industrialized worldwide.
The presentation outlines the aspects of vulnerabilities in drones, UAVs and other such ICS
Patents
-
METHOD AND SYSTEM FOR TELECONFERENCING USING COORDINATED MOBILE DEVICES
Filed 63/202,796
Courses
-
Certified Cyber Security Professional
-
-
The Art of Bounty Hunting
-
Projects
-
VHF Based Vessel Monitoring & Tracking System
-
GSM based Loadshedding and Substation monitoring system
-
A GSM and Micro-controller based Sub station monitoring system capable of remotely managing load shedding and power cuts in urban areas. Saving overall mobilization costs of K-Electric and LESCO
-
Mechanical Hover Bike
A Mechanical Contraption equipped with propellers and thrusters capable to levitating up-to 5 feet off the ground
Honors & Awards
-
Entrepreneur of the Year
GiSec Global and UAE Government
-
40 Under 40 in Cyber Security
Top Cyber News Magazine
-
Tech Hero Award in Top 100 Tech Heroes
Ministry of Interior Pakistan
-
AVAR 2023
AVAR Asia
-
Blackhat MEA 2023 Keynote Speaker
Blackhat
-
Keynote Speaker at Hacktivity Budapest
Hacktivity
-
Panelist and Speaker at One Conference NL
One Conference
-
Speaker at FIC InCyber Forum North America
InCyber Forum
-
Keynote Speaker OWASP AppSec Global Singapore
OWASP
-
Keynote Speaker at Arab Security Conference
Arab Security Conference
-
Keynote Speaker at National Cyber Summit (NCS)
National Cyber Summit
-
Keynote Speaker at ThreatCon
ThreatNix
-
Speaker at The Seventeenth International Conference on Emerging Security Information, Systems and Technologies SECURWARE 2023
IARIA
-
Speaker at BSides
BSides
-
Speaker at DEFCON 31
DEFCON
-
Keynote Speaker OWASP NZ Day
OWASP
-
Keynote Speaker at Nordic IT Security Summit
Nordic IT Security Summit
-
Keynote speaker and Panelist at FIC 2023
FIC
-
Speaker and Demonstrator at GiSec
GiSec
-
Keynote Speaker Blackhat MEA
Blackhat
-
Keynote Speaker at Hackfest Canada
Hackfest Canada
-
Cyber security Advisor to Government of Pakistan - Ministry of Finance
Ministry of Finance
-
Heroes of Pakistan (Hamaray Heroes) Award
Pakistan Cricket Board
-
Top Achiever's Award
EC Council University
-
ISACA Honorary Speaker Award
ISACA
-
High Achiever and Distinguished Alumni Award
Usman Institute of Technology
-
Skilled Security Researcher Award
Deputy Mayor Karachi
-
Kickstarter Hall of fame 2017
Kickstarter
-
Ted Speaker
Ted
-
Microsoft Hall of fame 2017
Microsoft
-
Airbnb Hall of fame 2016
Airbnb
-
3rd Ranked Bug bounty hunter on the globe
Dark Reading
-
Twitter Hall of fame and Reward April 2016
Twitter
-
Google Hall of fame 2016
Google
-
Bitdefender rewards 2016
Bitdefender
-
Snapchat Hall of fame and rewards 2016
Snapchat
-
Oracle CPU January 2016
Oracle
-
S.A.P Hall of fame January 2016
SAP
-
8th ranked Hacker worldwide by Hackerone 2015
Hackerone
-
Apache Acknowledgement CVE 2015-5349
Apache
-
Apache Acknowledgment 2015 CVE-2015-5349
Apache
-
Apple Hall of fame 2015
Apple
-
Blackberry Hall of fame December 2015
Blackberry
-
Google Hall of fame and Rewards
Google
-
Shopify Hall of fame and Rewards October 2015
Shopify
-
Facebook Hall of fame and Reward September 2015
Facebook
-
Facebook Hall of fame and Reward August 2014
Facebook
-
Zimperium Hall of fame 2015
Zimperium
-
Microsoft Honor Roll Quarter 3 - 2015
Microsoft
-
Microsoft Hall of Fame June 2015
Microsoft
-
Microsoft Honor Roll Quarter 2 - 2015
Microsoft
-
Snapchat Hall of fame 2015
Snapchat
-
CrowdCurity Hall of fame and Reward
CrowdCurity
-
Dropbox Hall of fame and Rewards 2015
Dropbox
-
Oracle CPU credit 2014
Oracle
-
Facebook Hall of fame - Whitehats Page 2014 and 2015
Facebook
-
Google Hall of fame and Rewards
Google
-
Microsoft Hall of fame and Rewards - Microsoft Thanks page 2013, 2014, 2015, 2016
Microsoft
-
Mozilla Hall of fame and rewards 2015
Mozilla
-
AT&T Hall of fame 2014
AT&T
-
Twitter Hall of fame - Year 2014 & 2015
Twitter
-
Heroku Hall of fame and Rewards
Heroku
-
Hackerone Hall of fame 2014
Hackerone
-
Yahoo Wall of fame - Bug bounty hunter reward 2014
Yahoo
-
LinkedIN rewards 2014
LinkedIN
-
Coinbase Hall of fame and Rewards
Coinbase
-
Keynote Speaker National Cyber Summit
National Cyber Summit
-
Prezi Hall of fame and Rewards
Prezi
Languages
-
English
-
-
Punjabi
-
-
Arabic
-
-
Siraiki
-
-
German
-
-
Sindhi
-
Organizations
-
OWASP
Chapter Leader Pakistan
-
Charity Hackers Organization
CEO
-
Maads Security
-
More activity by M. Shahmeer
Don’t forget to register for this Sunday’s virtual open house. Find out about our mentored research PhDs and how you can complete by a publication…
Liked by M. Shahmeer Amir
I am truly humbled and delighted to be named a CRN Women of the Channel 2024! I am infinitely grateful to ImmuniWeb Team and all my incredible…
Liked by M. Shahmeer Amir
🌟 I am speaking at the #CyberCon Meta 🌟 Explore topics ranging from national cybersecurity strategies to cutting-edge threat intelligence and…
Liked by M. Shahmeer Amir
June 2025 will mark the inaugural edition of the InCyber Forum San Antonio. It will be the first time in 15 years the InCyber Forum has come to the…
Liked by M. Shahmeer Amir
This partnership between Wateen Telecom Limited and Islamabad Diagnostic Centre (PVT) LTD, not only equips IDC with the necessary tools to facilitate…
Liked by M. Shahmeer Amir
Honourned to have you on board. See you soon.
Liked by M. Shahmeer Amir
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More