Passionate about securing systems and networks, identifying vulnerabilities, and ethical hacking
Aspiring cybersecurity professional passionate about securing systems and networks. Seeking an entry-level Penetration Tester role to apply my knowledge in identifying and resolving vulnerabilities while gaining hands-on experience and sharpening my ethical hacking skills.
My current focus is on developing advanced penetration testing skills and building comprehensive security tools to contribute to the cybersecurity community. I am committed to continuous learning and staying updated with the latest security trends and technologies.
Located in Hyderabad, I bring a unique perspective to cybersecurity challenges through hands-on project development and practical application of security concepts. My goal is to become a skilled ethical hacker who can help organizations strengthen their security posture against evolving cyber threats.
English | Telugu | Hindi
Specialized in cybersecurity with focus on penetration testing and network security.
Completed intermediate education with strong foundation in mathematics and science.
Achieved excellent results in secondary education with strong academic performance.
Empowered by a forward-thinking approach to cybersecurity, I am dedicated to mastering the tools and techniques that build a more resilient and secure digital landscape.
Professional, browser-based automated Vulnerability Assessment and Penetration Testing (VAPT) report generator. Streamlines the creation of comprehensive security assessment reports with advanced finding management and auto-generated statistics.
Advanced Python-based scanner utilizing Response Differential Analysis and Structure-Aware Content Fingerprinting (Ghost Filtering) to eliminate false positives and accurately detect vulnerabilities like SQLi and XSS.
Comprehensive utility designed to assist ethical hackers and cybersecurity professionals in performing essential penetration testing tasks.
A deployed full-stack documentation application featuring a modern frontend interface and a robust backend API server. Configured and deployed using Vercel for the frontend and Render for the backend to ensure high availability.
Source code for this personal portfolio website, featuring a modern cybersecurity-themed aesthetic, responsive design, and interactive UI elements. Built with a focus on high performance and smooth user experience.
Built a Python-based tool to discover subdomains using DNS brute-force and wordlist techniques. Integrated multithreading for faster performance and validated live domains using socket resolution.
Designed an SSH login cracker supporting dictionary attacks with threading, retries, delays, and output logging. Developed both CLI and GUI versions for flexible user experience.
Python-based tool designed to monitor changes in files by calculating and comparing hash values using SHA256 for ensuring file integrity.
A feature-rich clipboard manager for Windows that saves and organizes clipboard history with sensitive content detection (e.g., passwords, keys) and automatic cleanup.
A Python-based tool designed to detect live hosts in a network using both active ARP probing and passive sniffing modes.
Advanced service enumeration and vulnerability assessment tool built for penetration testers to discover open ports and audit services.
A Python-based SSL-encrypted backdoor for secure remote shell access, developed for red teaming and research purposes.
A cross-platform tool demonstrating the extraction of sensitive data such as browser credentials, Wi-Fi passwords, and clipboard contents.
A high-performance, multi-threaded hash cracking tool supporting 14+ algorithms including MD5, SHA variants, NTLM, and bcrypt. Features smart hash-type detection and error-resilient input validation.
A multithreaded Python tool designed to crack password-protected PDF files using wordlists or brute-force methods.
A defensive tool used to encrypt and protect PDF files with strong passwords and metadata preservation.
A command-and-control system for managing multiple SSH-enabled machines to simulate botnet behavior or launch authorized DDoS simulations.
A project developed during a Cybersecurity internship focused on secure file encryption and decryption using the AES-256 algorithm.
A web-based authentication system focusing on secure user registration, session protection, and credential management.