B.Tech CSE grad with hands-on offensive security experience โ penetration testing, adversary simulation, and tool development. Pursuing M.Tech in Cybersecurity. Breaking systems ethically so defenders can build them stronger.
I'm 5pyd3r โ a cybersecurity practitioner with a strong computer science foundation and a sharp focus on offensive security. My obsession: understanding how systems break before adversaries do.
I've built honeypot assessment frameworks, engineered endpoint security research tools, and deployed SIEM pipelines โ all from scratch, all ethically.
Currently pursuing M.Tech in Cybersecurity, targeting red teaming and security auditing roles at enterprise organizations โ Big 4, Cisco, CrowdStrike, Palo Alto Networks.
When I'm not poking at attack surfaces, I'm mapping TTPs to MITRE ATT&CK, grinding CTFs on TryHackMe, or writing security research.
Systematic security analysis framework targeting honeypot infrastructure. Multi-vector attack scenarios against Cowrie, Conpot, and Wordpot on AWS EC2 โ detection evasion, log manipulation, privilege escalation, reverse exploitation, and DoS. Real-time attack telemetry dashboard. Published as peer-reviewed research.
Python-based tool for keylogger and RPE research. Simulated USB payload delivery to evaluate EDR gaps. AES-encrypted telemetry stored in MongoDB Atlas with a real-time web interface for security control assessment.
Terminal-based real-time Linux monitoring in C++ with ncurses. Parses /proc for granular CPU, memory and process stats โ applicable to process injection detection and anomaly baselining.
Actively seeking red teaming and security auditing roles. Big 4, Cisco, CrowdStrike, Palo Alto โ or anywhere the work is serious. Reach out.