Cybersecurity Specialist
Breaking systems to secure them.
The Hacker Mindset
I'm a cybersecurity professional who believes the best defense starts with understanding the attack. My passion lies in penetration testing and red teaming — essentially, I break things professionally so developers can build them stronger.
Specializing in OWASP Top 10 vulnerabilities, I've identified critical flaws in web applications including XSS, SQL Injection, SSRF, CSRF, and IDOR vulnerabilities that could have been catastrophic if left unchecked.
Every vulnerability I find is a victory — not just for me, but for the security of thousands of users whose data stays protected.
Web Security
OWASP Top 10
Bug Bounty
HackerOne & Bugcrowd
Red Teaming
Offensive Security
Threat Detection
SIEM & Monitoring
My Philosophy
"In cybersecurity, you're either breached or about to be breached." My mission is to make that second option as difficult as possible — one vulnerability at a time.
Skills & Tools
XSS
Cross-Site Scripting detection & exploitation
SQL Injection
Blind & union-based SQL injection
SSRF
Server-Side Request Forgery
CSRF
Cross-Site Request Forgery
IDOR
Insecure Direct Object Reference
CORS
CORS misconfiguration exploitation
Projects & Findings
Web Application Penetration Testing
Security Assessment
Comprehensive security audit of enterprise web applications to identify vulnerabilities before malicious actors can exploit them.
Impact: Identified 3 critical XSS vulnerabilities in authentication flows affecting 50,000+ user accounts
Reflected XSS in login form
E-Commerce SQL Injection Assessment
Vulnerability Assessment
Found critical SQL injection vulnerability in product search functionality of a major e-commerce platform.
Impact: Prevented potential data breach of 2M+ customer records including PII and payment information
Union-based SQL Injection
Red Team Social Engineering Simulation
Red Teaming
Executed phishing campaign to test organizational security awareness and incident response capabilities.
Impact: Achieved 23% click-through rate, helping organization implement enhanced security training
API Security Assessment
Web Security
REST API security testing for a fintech startup, identifying authentication and authorization flaws.
Impact: Found IDOR vulnerability allowing unauthorized access to user financial data - patched before production release
IDOR + Broken Access Control
Cloud Infrastructure Assessment
Cloud Security
AWS and Azure cloud environment security review for a healthcare SaaS company.
Impact: Identified misconfigured S3 buckets and over-permissive IAM roles - fixed to meet HIPAA compliance
Network Penetration Test
Infrastructure
Internal network security assessment for a mid-sized enterprise.
Impact: Gained domain admin access through lateral movement, demonstrating need for network segmentation
Tools & Platforms
HackerOne
Leading bug bounty platform with enterprise clients and high-value programs
Ranked
Bugcrowd
Crowdsourced security platform connecting researchers
Active
TryHackMe
Hands-on cybersecurity learning platform
Rooms Completed: 50+
Hack The Box
Advanced penetration testing laboratory
HTB Rank: Hacker
Core Security Tools
Framework Knowledge
Proficient with MITRE ATT&CK framework for threat modeling and adversary simulation. Familiar with OWASP testing guide and PTES methodology for comprehensive security assessments.
Certifications
Certified Ethical Hacker (CEH)
WsCubeTech
Comprehensive certification covering ethical hacking methodologies, footprinting, reconnaissance, and network penetration testing.
Certified Penetration Tester
WsCubeTech
Hands-on penetration testing certification with focus on real-world attack scenarios and vulnerability exploitation.
Web Security Specialist
TryHackMe
Advanced web application security certification covering OWASP Top 10, XSS, SQL Injection, and web penetration testing techniques.
Computer Science and Engineering(Under Learning)
B.V.V.S S.R.Vastrad Rural Polytechnic, Guledagudd
The CSE diploma provides both theoretical knowledge and practical skills in areas like programming, computer systems, networking, and software development. It emphasizes hands-on learning through labs, projects, and internships.
Currently Pursuing
Pentest (Penetration Test)
CyberTerminal
Type help for commands • scan target.com for demo • exploit xss for exploitation