Personal Portfolio

My Experience

Personal Portfolio
2025

SECT

Cybersecurity Engineer (Intern)

Performed Reconnaissance, Vulnerability Assessment,

Data Breach Analysis and OWASP Mapping

Bachelor

Education

Personal Portfolio
2025-Present

B.Tech CSE in Cloud Technology

& Information Security

Sandip University

Pursuing

Use CV for reference

My Resume

2008 - 2026

Education Quality

B.Tech CSE CTIS

Sandip University (2022 - 2026)
9.1/10

Currently Pursuing B.Tech in Computer science with specialization in Cloud Technology and Information security, Learning Cloud Architecture and Practicing Ethical Hacking

10 + 2 (ICSE)

SDA High School (2008 - 2022)
81%

Most precious and amazing time of my life

Professional Skills

Cyber Threat Intelligence (CTI)
Cybersecurity
Ethical Hacking
Linux
Docker
Git & GitHub
Networking
MITRE ATT&CK® / TTP
Threat Analysis
Deep & Dark Web Research and Investigation
Python
Unix
Poweshell
Shell Scripting
Linux System Administration
Metasploit
Tor
Vulnerability Assessment and Penetration Testing (VAPT)
Burp Suite
Digital Forensics
VMware
Selenium
Bash
HTML/CSS
Object-Oriented Programming (OOP)
Painting

TryHackMe Badges

Badge 8

Red-Team of the Month

Badge 1

Certified Red Teamer

Badge 2

ADversary

Badge 3

Burp'ed

Badge 9

OWASP Top 10

Badge 10

Metasploitable

Badge 4

Terminated!

Badge 5

Shield Apprentice

Badge 7

cat linux.txt

Badge 6

Hacking for 30 days

Badge 11

Hacking for 90 days

Badge 12

Hacking for 180 days

2025

Job Experience

Cybersecurity Engineer (Intern)

SECT (2025)
Leaderboard #1 in Cybersecurity

Performed Reconnaissance, Vulnerability Assessment, Data Breach Analysis and OWASP Mapping

Projects

Master-Darknet

Documentary

Master-Darknet is a long-term, evolving documentation project that explores the technical, practical, historical, philosophical, and ethical foundations of the Deep Web, Dark Web, and anonymity networks.

LazyKey

GUI

A Keyboard Shortcut Utility of Copy, Paste, Cut, Undo and Redo for Lazy People.

Cybersecurity Report

SECT (2025) (PDF)

Performed Reconnaissance, Vulnerability Assessment, Data Breach Analysis and OWASP Mapping on tendermines.com and documented it in a report

SpiderHash

Final year project (GUI)

An Offensive software which can crack around 22 Hashing algorithms using Brute-Force, Probabilistic attack, Rule-Based, Wordlist and RainbowTable

SimpleSlate

GUI

A Simple platform independent Note making application designed in python

Zip-CrackerX

GUI/CLI

A Zip file cracker programmed in Python with CLI as well as GUI. It is compatible to crack zip file having "Zip Legacy Encryption" by using Bruteforce

DarkwebHoster

CLI

An Awesome tool to convert your localhost into a Darkweb Server

TOR-Forensics

PDF

An Awesome list of study material fetched from darkweb for learning TOR Forensics or Darkweb Forensics

ps1-script-runner

CLI

Run any ps1 script in Windows Home Edition without restrictions

cityhash128-converter

CLI

Convert plaintext to cityhash-128 hash

Certification

Red Teaming

TryHackMe (Aug 24, 25)

• Performed Active and Passive Reconnaissance
• Used diverse techniques for initial access
• Performed Phishing attacks
• Enumerate and persist on targets
• Performed Network Security Evasion
• Evade security solutions
• Exploit Active Directory

100 Days of Code: The Complete Python Bootcamp

Udemy (May 1, 24)

• Acquired expertise in procedural programming paradigms and associated logical concepts, enhancing capabilities.
• Mastered fundamental Python syntax, proficiently utilizing control flow, loops, functions, and data structures.
• Mastered various frameworks like Selenium, Pandas, Django, Flask, NumPy, and Tkinter.
• Made many real-time projects during the sessions.

The Complete Computer Forensics Course : CFCT+ PRO CFIR DFIR

Udemy (June 26, 24)

• Acquired expertise in digital forensics, evidence collection and preparation.
• Learned various fundamentals like disk and file analysis, storage acquisitions, Linux filesystems, network forensics and browser forensics.

Ethical Hacking / Penetration Testing & Bug Bounty Hunting

Udemy (January 10, 25)

• Acquired expertise in Penetration testing & Bug Bounty Hunting using various tools and frameworks.
• Mastered web application testing using Burp Suite, by performing various simulations of attacks.
• Learned the OWASP top 10 and its security standards.

Platforms

PyCharm
Visual Studio Code
VMware
Virtual Box

OS

Kali Linux
Ubuntu
TAILS
RHEL
Windows

Soft Skills

Creative thinking