Penetration Tester & Security Developer based in Bengaluru, India.
I build offensive security tools, research post-exploitation techniques, and work on IoT attack surfaces. Currently pursuing BCA at Yenepoya University (2023–2026) while working hands-on in the field.
- Web Application Security — automated scanning, vulnerability discovery, report generation
- Post-Exploitation — credential harvesting, browser decryption, data exfiltration simulation
- IoT & Embedded Security — ESP32-based wireless attack tooling, BLE/Wi-Fi/RFID research
- Malware Research — Windows API internals, keylogging, DPAPI decryption mechanics
| Project | Description | Stack |
|---|---|---|
| WPT | Modular web application security scanner — DNS, SSL, headers, WAF, API, JS, cookies | Python |
| BrowserVault | Post-exploitation credential harvester simulating DPAPI browser decryption + exfil | Python |
| Keylogger | Windows keystroke capture with base64 encoding and SMTP exfiltration | Python |
| Enigma | CLI-based IoT security toolkit for ESP32 — Wi-Fi, BLE, RFID attack simulation | C++ |
Languages: Python · C++ · Bash · C · JavaScript
Security Tools: Burp Suite · Metasploit · Nmap · Wireshark · Scapy
Python Libraries: scapy · requests · pynput · pywin32 · ctypes · selenium · cryptography
Systems: Arch Linux (CachyOS/Hyprland) · Windows · Git · Docker
- Google Cybersecurity Certificate
- Penetration Tester Certification
- BCA — Yenepoya University (in progress, 2023–2026)
Security research collaborations · CTF teams · Bug bounty partnerships · Open source security projects · Freelance penetration testing
All tools and PoCs in this profile are built for authorized security research, red team labs, and educational use. Only test systems you own or have explicit written permission to audit.


