Final-year B.Tech Cyber Security | Offensive Security Enthusiast
Highly motivated final-year B.Tech Cyber Security student with a strong passion for offensive security. Skilled in identifying, exploiting, and documenting critical security vulnerabilities through hands-on experience in vulnerability assessment and penetration testing. Proficient in developing security tools and exploiting OWASP Top 10 vulnerabilities using platforms such as Metasploit, Burp Suite, and Nmap. Eager to apply practical, real-world cybersecurity skills in an entry-level Penetration Tester or Security Analyst role.
- Engineered a Flask-based web vulnerability scanner for internal use by the State Cyber Police to automate security testing of web applications used in investigations and departmental operations.
- Observed and learned mobile forensics and hard drive forensics procedures, such as data acquisition, hashing, evidence preservation, and chain-of-custody practices.- Delivered a forensics training session to 10+ ASIs across Madhya Pradesh, teaching mobile and hard-drive forensics procedures while collaborating with fellow interns to guide officers through real investigation workflows.
- Practiced and completed multiple OWASP WebGoat labs, including injection, XSS, authentication flaws, and broken access control to strengthen web application security skills.
- Gained hands-on experience in identifying and mitigating real-world web vulnerabilities using ethical hacking tools and secure coding practices.
- Executed a comprehensive vulnerability assessment on a client web application, utilizing Nmap for reconnaissance and Burp Suite for in-depth analysis.
- Authored a detailed final assessment report for the development team, documenting the testing methodology and confirming the application's robust security posture.
Detects XSS, SQLi, CSRF & Clickjacking with automated PDF reporting.
Fake login pages capturing attacker IP, login attempts & GeoIP logs.
Python-based port reconnaissance using raw sockets for pentesting.
Impact: Strengthened practical penetration-testing ability and developed the same structured attack workflow used by real-world security analysts — scanning → exploitation → privilege escalation → post-exploitation → documentation.
Main certifications & internship certificates — screenshots below. Click any image to open full size.
State Cyber Cell Headquarters
Cyber Security & Digital Forensics Intern
The Red Users
Cyber Security Intern
Global Defensive Security
Cybersecurity Intern
Ethical Hacking (6-Month Training)
Global Defensive Security — May 2024
Red Team Leaders: Certified Cybersecurity Educator Professionaal (CCEP)
Udemy: Cybersecurity: password hacking and malware security
Udemy: GenAI cybersecurity Solutions: OWASP Top 10 for LLM Apps
Udemy: Mastering Cybersecurity: Essential Knowledge and Techniques
Samatrix: Foundation To CS & Digital Forensic
Samatrix: Python for Cybersecurity
Udemy: Cybersecurity: Vulnerability Assessment & Pentesting (VAPT)
Udemy: WebHack for Ethical Hacking Ultimate Defensive Skills
TechHacker Ethical Hacking & Cyber Security Bundle
Bitten Tech — Oct 2023
EC-Council: Cybersecurity for Businesses
EC-Council: Make In-house Hacking Lab
Deloitte Australia - Cyber Job Simulation
mastercard - Cybersecurity Job Simulation
Tata - Cybersecurity Analyst Job Simulation
Tech Mahindra foundation online skilling course
MSDE Skill India
EC-Council: SQL Injection Attacks
Certificate Of Course Completion
Verzeo