Cybersecurity Lead · Penetration Tester · Tool Builder
B.Tech CSE student at RCCIIT with hands-on experience in offensive security, network defense, and web application testing. I build tools, break systems legally, and run security events that people actually remember. CEH v13 trained.
// capabilities
Security Tools
Programming
Domains
Operating Systems
// work
// flagship project
The primary tool I built — everything else led to this.
One command. Full recon. Five tools chained automatically based on what the previous step finds. Port 80 open → auto-triggers directory brute-forcing, web crawl, Nuclei CVE validation. Port 22 open → auto-tests default SSH credentials. NVD CVE lookup runs automatically on every detected service. Then feeds everything to AI for actual attack paths with exact commands and payloads.
Supports 5 AI providers (GitHub Models — DeepSeek-R1, Groq, Gemini, OpenAI, Anthropic) with automatic fallback if one runs out of credits. Installable as a real Kali Linux command.
// case-based projects
Focused tools built to solve specific problems. Each one taught a skill that fed into crecon.
Real-time network security monitor. Sniffs every incoming packet with Scapy, detects DDoS attacks (>40 pkt/sec), checks for malware signatures (SQL injection, XSS, Nimda, path traversal), and auto-blocks IPs with iptables.
Log file auditor and IP wiper. Scans a directory of log files, finds every file containing a specific IP address, and optionally deletes them. Useful for post-incident forensics and cleanup.
ExploitDB instant search launcher. Reads whatever software/version is on your clipboard and opens ExploitDB pre-filled with that search. Saves time during every engagement — copy a version, run expDB, done.
// events & initiatives
Security events I organised and ran — where the work moved from the terminal into the real world.
Organised a full-day security awareness event. Skipped the slides — opened terminals instead. Live demos of password cracking and auditing using Hydra and John the Ripper. Received Certificate of Appreciation from HoD, Dept. of IT.
Fully custom CTF platform themed around Stranger Things. Gutted CTFd's frontend for a glitchy terminal aesthetic. Containerized all vulnerable machines with Docker. Cold-pitched infosec companies to fund a ₹2L+ prize pool. Officially listed on CTFtime.
// credentials
CEH v13 — Certified Ethical Hacker Training
Simplilearn · EC-Council · Training completed — exam in progress
Certificate of Appreciation — Cybersecurity Day 2026
RCCIIT · Signed by HoD, Dept. of IT & Faculty Advisor, IgniteX Club
Automate the Boring Stuff with Python
Udemy · Al Sweigart · March 2026 · 9.5 hours
TryHackMe & HackTheBox
Penetration testing, privilege escalation, and network recon in simulated enterprise environments
B.Tech — Computer Science & Engineering
RCCIIT University · 2023 – 2027 · Relevant: Data Structures, Networking, Cybersecurity