Cybersecurity Lead · Penetration Tester · Tool Builder
Your attack surface has gaps. I find them before threat actors do.
I don't just learn security — I build tools that automate it, design CTFs that simulate real attack chains, and run workshops that turn passive users into security-aware professionals. If your team needs someone who thinks like an attacker and communicates like a collaborator, that's the gap I fill.
// capabilities
What I bring to your security team — tools I operate, techniques I apply, systems I've worked in.
Security Tools
Script Literacy
I read and adapt scripts — I know what every module does, what a function is trying to achieve, and how to modify it. Security is the skill. Code is the tool.
Domains
Operating Systems & Platforms
HackTheBox Academy — Badges Earned
Click a category to expand & scroll through badges.
scroll to see all
scroll to see all
// work
What I've delivered — not just what I've learned.
// flagship project
A tool built to replace manual recon workflows — the kind of thing your pentesting team would actually use.
Automates the first phase of every engagement. Port 80 open → triggers directory brute-force, web crawl, Nuclei CVE validation automatically. Port 22 open → auto-tests default SSH credentials. NVD CVE lookup fires on every detected service version. All findings are piped to an AI layer that generates actual attack paths — not generic advice, but exact commands and payloads.
Supports 5 AI providers (DeepSeek-R1, Groq, Gemini, OpenAI, Anthropic) with automatic fallback. Installable as a native Kali Linux command. Built for real engagements, not demos.
// case-based projects
Focused tools built to solve specific gaps — each one deployable in a real security workflow.
Real-time network security monitor your SOC can actually use. Sniffs every incoming packet via Scapy, detects DDoS spikes (>40 pkt/sec), flags malware signatures (SQLi, XSS, Nimda, path traversal), and auto-blocks offending IPs with iptables — no analyst action required.
Post-incident log auditor. Scans a full directory of log files, pinpoints every file containing a target IP, and optionally wipes them clean — saving hours of manual grep work during forensic cleanup and containment.
Exploit lookup, zero friction. Reads the software/version from your clipboard and opens ExploitDB pre-filled — cutting the lookup time to seconds during live engagements. Small tool, real time savings at scale.
// events & initiatives
Security events I organised end-to-end — logistics, sponsorship, platform, challenges, and delivery.
Replaced slide decks with live terminals. Walked 100+ students through real password cracking using Hydra and John the Ripper. Earned Certificate of Appreciation from HoD, Dept. of IT — for measurable impact on campus security awareness.
Custom CTF platform, Stranger Things theme, glitchy terminal aesthetic — gutted CTFd's frontend from scratch. Secured ₹2L+ through cold B2B outreach to infosec companies. Officially listed on CTFtime.
Live platform data — CTFd admin dashboard & CTFtime results
// credentials
Verified credentials — what I've put in the work to earn.
APISec Certified Practitioner (ACP)
APIsec University · API security testing, authentication flaws, OWASP API Top 10
CRTP — Certified Red Team Professional
Altered Security · Active Directory attacks, Kerberos abuse, lateral movement ·
CEH v13 — Certified Ethical Hacker Training
Simplilearn · EC-Council · Training completed · Exam target: Oct 2026
Certificate of Appreciation — Cybersecurity Day 2026
RCCIIT · Signed by HoD, Dept. of IT & Faculty Advisor, IgniteX Club
Automate the Boring Stuff with Python
Udemy · Al Sweigart · March 2026 · 9.5 hours
HackTheBox — Junior Cybersecurity Analyst Path
Completed · Web exploitation, network enumeration, privilege escalation in simulated enterprise environments
B.Tech — Computer Science & Engineering
RCCIIT University · 2023 – 2027 · Data Structures, Networking, Cybersecurity
// reach out
Looking for an offensive security intern who ships tools, runs events, and thinks like an attacker? Let's talk.