C
Performance-first tooling and concurrency work.
Built security tooling with process-level control and efficient memory handling for faster scan workflows.
Offensive Security Portfolio
Aspiring offensive security professional building practical automation that speeds up reconnaissance, vulnerability analysis, and reporting.
Technical Stack
Performance-first tooling and concurrency work.
Built security tooling with process-level control and efficient memory handling for faster scan workflows.
Foundational problem solving and object-oriented design.
Applied Java for structured logic, class design, and DSA practice that improves implementation discipline.
Automation and scripting support for security workflows.
Used for rapid scripting, task automation, and proof-of-concept helpers during recon and validation.
Relational analysis and database-driven reporting.
Wrote optimized queries for extraction, filtering, and result-based reporting in security datasets.
ReconX backend automation and workflow acceleration.
Leveraged async and parallel request handling to speed endpoint discovery and reduce manual recon time.
Offensive Usage
Primary toolkit for web security testing workflows.
Used for interception, repeater testing, and parameter-level validation in web vulnerability assessments.
Used for proof-of-concept and exploitation validation.
Supports controlled exploit simulation and post-exploitation checks in lab-focused offensive scenarios.
Network mapping and vulnerability-focused enumeration.
Applied for host discovery, service version detection, and script-based reconnaissance automation.
Fast discovery of hidden paths and resources.
Used for directory, DNS, and virtual host brute-force style enumeration during recon stages.
Rapid fuzzing to accelerate reconnaissance coverage.
Handles high-speed endpoint and parameter fuzzing to surface hidden attack paths quickly.
Comfortable usage across Kali Linux, Ubuntu, and Windows.
Preferred setup for penetration testing workflows.
Daily environment for offensive tooling, automation scripts, and reproducible security labs.
Reliable platform for scripts and lab environments.
Comfortable for development workflows, CLI tooling, and lightweight virtual lab setups.
Used for daily workflows and cross-platform testing.
Used for documentation, testing compatibility, and mixed environment execution.
Featured Build Work
C-based automation framework integrating Nmap and SQLite, reducing scan time by 70% across 200+ hosts and cutting analysis effort by 85%.
Web reconnaissance automation tool using Node.js, FFUF, and Gobuster that discovered 50+ hidden endpoints and reduced reconnaissance time from 2 hours to 30 minutes.
Identified and responsibly reported a real-world vulnerability in ToriiWeb, demonstrating practical exploitation analysis and security reporting discipline.
Built consistent problem-solving depth through 61 LeetCode solutions in C, MySQL, and Java, including streak-based practice and contest participation.
Hover to Reveal
I focus on building tooling that makes repeated security tasks faster and more reliable.
From NmapAnalyzer in C to ReconX in Node.js, my approach is to convert manual, error-prone reconnaissance into measurable, scriptable workflows.
Practical labs and real systems are my main way to grow in offensive security.
I am ranked in the top 7% on TryHackMe and use challenge-based environments to sharpen enumeration, vulnerability validation, and attack path thinking.
Algorithmic and database problem solving supports my security mindset.
LeetCode practice in C, SQL, and Java helps me reason about edge cases, optimize logic, and write cleaner automation under constraints.
Academic Track
Nagarjuna College of Engineering and Technology (VTU, AICTE)
Sep 2024 - Aug 2028
CGPA: 6.7
Narayana Junior College, Anantapur
Sep 2022 - Mar 2024
Score: 74%
Recognition
Ranked among top learners through hands-on offensive security practice.
View ProfileFormal certification by cisco validating ethical hacking fundamentals and practical security concepts.
View BadgeReported a real vulnerability in Torii portal with responsible disclosure and structured documentation.
Discuss DetailsCompleted cybersecurity internship projects, demonstrated dedication and enthusiasm.
View DetailsContact
I am actively building practical offensive security skills and security automation systems. Reach out for internships, project collaboration, or security-focused opportunities.