// RED TEAM  ·  PENETRATION TESTING  ·  SECURITY AUDITING
5pyd3r
> Aspiring Red Teamer & Security Auditor

B.Tech CSE grad with hands-on offensive security experience — penetration testing, adversary simulation, and tool development. Pursuing M.Tech in Cybersecurity. Breaking systems ethically so defenders can build them stronger.

0
// TOOLS BUILT
0
// PUBLICATION
0
// CERTS
0
// CGPA
01 //

ABOUT

I'm 5pyd3r — a cybersecurity practitioner with a strong computer science foundation and a sharp focus on offensive security. My obsession: understanding how systems break before adversaries do.

I've built honeypot assessment frameworks, engineered endpoint security research tools, and deployed SIEM pipelines — all from scratch, all ethically.

Currently pursuing M.Tech in Cybersecurity, Targeting offensive security roles — red teaming, adversary simulation, and security auditing — where impact is real.

When I'm not poking at attack surfaces, I'm mapping TTPs to MITRE ATT&CK, grinding CTFs on TryHackMe, or writing security research.

// IDENTITY.JSON
ALIAS
5pyd3r
DEGREE
B.Tech — Computer Science Eng.
PURSUING
M.Tech — Cybersecurity
FOCUS
Red Teaming · Pentest · Auditing
BASE
India
STATUS
● Open to Opportunities
GITHUB
THM
02 //

SKILLS & ARSENAL

// OFFENSIVE TOOLS
Metasploit msfvenom Burp Suite Nmap Nikto WPScan Searchsploit AndroRAT StromBreaker Sherlock Trivy Bandit
// DEFENSIVE & MONITORING
Wazuh SIEM Wireshark Log Analysis Threat Detection MITRE ATT&CK Incident Response
// PROGRAMMING
Python GO C / C++ Bash Security Scripting Automation
// PLATFORMS & INFRA
Kali Linux Ubuntu AWS EC2 Docker VMware VirtualBox Git / GitHub MongoDB
03 //

PROJECTS

// PROJECT_02
KeySpy
Endpoint Monitoring & Keystroke Security Research Tool

Python-based tool for keylogger and RPE research. Simulated USB payload delivery to evaluate EDR gaps. AES-encrypted telemetry stored in MongoDB Atlas with a real-time web interface for security control assessment.

Pythonpynput AES EncryptionMongoDB Atlas msfvenom
// PROJECT_03
HawkPro
Linux System Monitor for Process & Resource Analysis

Terminal-based real-time Linux monitoring in C++ with ncurses. Parses /proc for granular CPU, memory and process stats — applicable to process injection detection and anomaly baselining.

C++ncurses CMakeLinux /proc
04 //

CTF & PLATFORMS

🟢
TryHackMe
tryhackme.com/p/5pyD3R
LEGEND
RANK
0
BADGES
0
ROOMS COMPLETED
VIEW PROFILE ↗
🟩
HackTheBox
app.hackthebox.com/profile/907310
Noob
RANK
0
BADGES
0
MACHINES PWNED
VIEW PROFILE ↗
05 //

EXPERIENCE

JUL 2024 — AUG 2024
CYBERSECURITY & ETHICAL HACKING INTERN
NIELIT Haridwar, India  ·  View Certificate ↗
  • Performed vulnerability assessment and exploitation using Metasploit, Nmap, Searchsploit, and Sherlock against Metasploitable and EternalBlue/DoublePulsar environments.
  • Conducted adversary simulation on Android targets using msfvenom, AndroRAT, and StromBreaker; documented full attack chains and mitigations.
  • Deployed and monitored Wazuh SIEM for threat detection, log correlation, and security event analysis in a simulated enterprise setup.
  • Analyzed WannaCry, NotPetya, and Stuxnet campaigns — extracting TTPs and mapping to MITRE ATT&CK framework.
  • Completed structured offensive and defensive CTF challenges on TryHackMe reinforcing exploitation and incident response skills.
06 //

CERTIFICATIONS

🎯
Jr. Penetration Tester
TRYHACKME
VIEW ↗
CompTIA Pentest+
TRYHACKME
VIEW ↗
🎄
Advent of Cyber 2024
TRYHACKME
VIEW ↗
🔐
Intro to Cyber Security
TRYHACKME
VIEW ↗
🌐
Web Fundamentals
TRYHACKME
VIEW ↗
☁️
Intro to Cloud Semester 1
AWS EDUCATE
VIEW ↗
☁️
Intro to Cloud 101
AWS EDUCATE
VIEW ↗
07 //

PUBLICATIONS

// PEER-REVIEWED · IJPREMS · MAR 2025
HONEYPOTT3R: An Open-Source Multi-Layered Security Analysis Framework for Honeypot Vulnerability Assessment
A. B. Thakur, 5pyd3r, S. Rahman, and A. Chaurasia
International Journal of Progressive Research in Engineering Management and Science (IJPREMS)
Vol. 5, Issue 3, pp. 1723–1730 · March 2025
⌖ DOI: 10.58257/IJPREMS39220 ↗
08 //

CONTACT

LET'S CONNECT

Actively seeking red teaming and security auditing roles; anywhere the work is serious and the impact is real. Reach out.

5pyd3r@kali:~
5pyd3r@kali:~$ whoami Red Teamer · Penetration Tester · Security Auditor   5pyd3r@kali:~$ cat status.txt ● OPEN TO OPPORTUNITIES   5pyd3r@kali:~$ cat targets.txt Pursuing offensive security roles where the work is serious and the impact is real.   5pyd3r@kali:~$ nmap -sV target.corp [*] Scanning ... open ports detected [!] Vulnerabilities found. Initiating report.   5pyd3r@kali:~$