I am a B.Tech Computer Science & Engineering student specializing in Cybersecurity, with a strong focus on offensive security, vulnerability research, and real-world attack simulations. I actively engage in hands-on labs, Capture The Flag (CTF) competitions, and security research to sharpen my technical and analytical skills.
My experience includes cloud security, Linux system administration, Active Directory environments, and practical exploitation techniques. I am passionate about identifying security weaknesses, understanding adversarial tactics, and building secure, resilient infrastructures.
I continuously challenge myself through competitive cybersecurity events and real-world problem-solving environments, aiming to grow as a security researcher and contribute meaningfully to the cybersecurity community.
Amroha Police Cyber Security Internship Program (2K25)
Independent
AIESEC | IMPunjab | GU-TBI
Python-based reconnaissance and vulnerability discovery workflow
approach: Automated subdomain enumeration, port scanning, and vulnerability fingerprinting
Tool to safely remove metadata from files before sharing
approach: Scans and strips EXIF and embedded metadata from images and documents
Decompiler tool targeting vulnerable binaries for analysis
approach: Performs automated binary decompilation and vulnerability pattern scanning
Scripts and tools for querying and interacting with Active Directory
approach: Automates enumeration of users, groups, and ACLs in Windows environments
Simple Python server for secure file sharing over a network
approach: Implements HTTP upload/download endpoints with access control and logging
Utility to analyze strength and compliance of user passwords
approach: Checks password structure, entropy, rules, and common patterns
Practical system security experiments
approach: Configured firewalls, SELinux policies, and intrusion detection on lab environments
JavaScript security analysis and vulnerability detection tool
approach: Scans JS files for vulnerable libraries, detects sensitive data leaks, and maps security endpoints with Web GUI
Cloud security fundamentals
National Level CTF by NCIIPC–AICTE
Hands-on practical training programs
$ contact --jasstej