VulnScanner Pro
Automated vulnerability scanning tool that chains Nmap, Nikto, and custom exploit checks into a single automated pipeline. Detects OWASP Top 10 vulnerabilities with detailed reporting.
Breaking things responsibly — finding vulnerabilities before the bad guys do.
$ cat about.txt
I'm a passionate cybersecurity student and ethical hacker with a focus on offensive security, web application vulnerabilities, and network penetration testing. I spend my time breaking things responsibly — finding vulnerabilities before the bad guys do. Currently pursuing a career in cybersecurity with hands-on experience in CTF competitions, bug bounty programs, and real-world penetration testing labs.
$ ls -la ./projects
Automated vulnerability scanning tool that chains Nmap, Nikto, and custom exploit checks into a single automated pipeline. Detects OWASP Top 10 vulnerabilities with detailed reporting.
Custom lab environment for testing and demonstrating Cross-Site Scripting vulnerabilities. Includes DOM-based, Reflected, and Stored XSS scenarios with educational writeups.
Educational SQL injection testing framework built from scratch. Supports error-based, blind, and time-based injection with automated payload generation against test targets.
Full penetration testing engagement against Metasploitable 2 environment. Complete with reconnaissance, exploitation, privilege escalation, and professional PDF report.
Custom packet capture and analysis tool using Scapy. Detects anomalous traffic patterns, ARP spoofing attempts, and suspicious DNS queries in real-time.
Curated collection of detailed CTF challenge writeups covering crypto, web, pwn, and forensics categories from platforms like HackTheBox, TryHackMe, and PicoCTF.
$ skill --list --verbose
[SYSTEM] Skill acquisition in progress...
Continuously learning · OSCP In Progress · Next: Advanced Exploit Development
$ git log --oneline
Sri Vidya Mandir Matriculation School
🎯 86.8%Completed 10th grade and began exploring the fundamentals of computers and networking. This phase sparked my curiosity about system behavior, security, and how digital systems operate behind the scenes — laying the foundation for my journey into cybersecurity.
Kongu Vellalar Matriculation Higher Secondary School
🎯 86.5%Completed 12th grade while diving into programming with Python and C++. Built a strong foundation in logic, problem-solving, and system-level thinking, which later became the base for exploring cybersecurity and scripting for automation.
K.S.R College of Engineering
🎯 8.435 CGPACurrently pursuing my college degree while actively building practical skills in cybersecurity. Working on hands-on labs using Kali Linux and vulnerable environments, exploring networking, system behavior, and real-world security vulnerabilities to develop an offensive security mindset.
Self-Directed / Udemy / YouTube
Completed comprehensive ethical hacking curriculum covering networking, web app security, exploit development, and OSCP-prep material.
TryHackMe
Completed 5+ rooms across offensive security, OSINT, and forensics tracks. Ranked in the top 5% globally.
HackerOne / Bugcrowd
Actively participating in bug bounty programs — discovered and responsibly disclosed XSS, IDOR, and authentication bypass vulnerabilities.
picoCTF / CTFtime
Competed in national and international CTF events, placing in top 20% in web exploitation and cryptography categories.
$ ./live_demo.sh
Watch a simulated penetration testing session. This is what a typical recon and exploitation workflow looks like.
$ ping me
Have a project, opportunity, or just want to talk security? My inbox is always open.