B.Tech CSE grad with hands-on offensive security experience — penetration testing, adversary simulation, and tool development. Pursuing M.Tech in Cybersecurity. Breaking systems ethically so defenders can build them stronger.
I'm 5pyd3r — a cybersecurity practitioner with a strong computer science foundation and a sharp focus on offensive security. My obsession: understanding how systems break before adversaries do.
I've built honeypot assessment frameworks, engineered endpoint security research tools, and deployed SIEM pipelines — all from scratch, all ethically.
Currently pursuing M.Tech in Cybersecurity, Targeting offensive security roles — red teaming, adversary simulation, and security auditing — where impact is real.
When I'm not poking at attack surfaces, I'm mapping TTPs to MITRE ATT&CK, grinding CTFs on TryHackMe, or writing security research.
Systematic security analysis framework targeting honeypot infrastructure. Multi-vector attack scenarios against Cowrie, Conpot, and Wordpot on AWS EC2 — detection evasion, log manipulation, privilege escalation, reverse exploitation, and DoS. Real-time attack telemetry dashboard. Published as peer-reviewed research.
Python-based tool for keylogger and RPE research. Simulated USB payload delivery to evaluate EDR gaps. AES-encrypted telemetry stored in MongoDB Atlas with a real-time web interface for security control assessment.
Terminal-based real-time Linux monitoring in C++ with ncurses. Parses /proc for granular CPU, memory and process stats — applicable to process injection detection and anomaly baselining.
Actively seeking red teaming and security auditing roles; anywhere the work is serious and the impact is real. Reach out.