Red Team Enthusiast · Bug Hunter · Web Pentester _
BCA student at JECRC University specializing in Cybersecurity. Focused on red teaming, bug hunting, and application security — exploring both offensive and defensive sides of the threat landscape.
I'm passionate about ethical hacking, red teaming, and continuous learning in cybersecurity. Currently in my 2nd year of BCA at JECRC University with a specialization in Cybersecurity.
I work with tools like Kali Linux and Burp Suite, and experiment with C2 frameworks such as Sliver, Mythic, StarKiller, and Havoc for controlled lab research.
My goal is to become a skilled red team operator who understands technical depth and ethical responsibility.
Red teaming workflows, controlled testing, and ethical exploitation methodologies.
OWASP Top 10, XSS, SSRF, IDOR, server misconfigurations and web pentesting.
Kali Linux, Burp Suite Pro, PowerShell, Go, and SharpCollection for engagements.
Havoc, StarKiller, Mythic, Sliver — encryption + obfuscation payloads, evasion research.
UAC research, registry persistence, DLL hijacking, and service misconfigurations.
Clear PoCs, responsible disclosure, and structured vulnerability reports.
A simple and clean Bash script that retrieves geographic information of an IP address — including country, city, ISP, and coordinates. Lightweight, dependency-free, and built for quick OSINT recon.
↗ View on GitHubDemonstrates understanding of ethical hacking, network defense, and cybersecurity fundamentals.
↗ View CertificateCompleted a 2-month internship (Oct–Nov 2024) gaining hands-on experience in practical cybersecurity tasks.
↗ View CertificateKnowledge of network security, defensive mechanisms, and threat detection — focused on securing enterprise networks through monitoring, incident response, and effective defense strategies.
↗ View CertificateFeel free to reach out for collaborations, bug bounty discussions, or just to talk about cybersecurity.