I am an offensive security professional with hands-on experience across penetration testing, red team operations, web application security, and multi-cloud attack surfaces. My approach combines structured methodology with continuous skill development — backed by industry-recognized certifications and 213+ hours of practical, lab-based training.
I am passionate about understanding systems from an adversary's perspective to help organizations identify and remediate real-world vulnerabilities before malicious actors can exploit them.
- 🎯 Specialization: Red Team Operations · Web & Network Penetration Testing
- ☁️ Cloud Security: Multi-Cloud Red Teaming (AWS & Azure)
- 🔬 Active: CTF competitions, security research, and lab environments
- 📍 Location: India
| Certification | Full Title | Issuing Body | Date | Credential ID |
|---|---|---|---|---|
| PNPT | Practical Network Penetration Tester | TCM Security | March 2026 | #176394850 |
| CRTA | Certified Red Team Analyst | CyberWarfare Labs | December 2025 | CRTA-6950255f6ae7611d64e5a9b2 |
| MCRRTA | Multi-Cloud Red Teaming Analyst | CyberWarfare Labs | September 2025 | 68c94d789652a6d406c04a33 |
| eJPT | Junior Penetration Tester | INE Security | September 2025 | 160177257 |
| Learning Path | Duration | Completed | Certificate ID |
|---|---|---|---|
| Red Teaming | 50 hrs 20 min | Feb 2025 | THM-2X6DCYJ30K |
| Offensive Pentesting | 32 hrs 45 min | Jun 2025 | THM-VE4FDDPQWW |
| Web Application Pentesting | 31 hrs 53 min | Jun 2025 | THM-I08Y4Z47KF |
| Cyber Security 101 | 45 hrs 43 min | Oct 2024 | THM-SLAVVM61M6 |
| Jr Penetration Tester | 28 hrs 55 min | Oct 2024 | THM-TVFZUJBD5M |
| Web Fundamentals | 16 hrs 35 min | Oct 2024 | THM-IM10W2UKVX |
| Pre Security | 7 hrs 28 min | Oct 2024 | THM-ODW3LWT7DD |
| Advent of Cyber 2025 24/24 Challenges | — | Dec 2025 | THM-FMH2IWFNRN |
Total Hands-On Training: 213+ hours of lab-based practical security training on TryHackMe, in addition to certification exam preparation.
Penetration Testing & Exploitation
Active Directory & Red Team
Cloud Platforms
Operating Systems
Scripting & Automation
| Domain | Key Areas |
|---|---|
| Network Penetration Testing | Enumeration, exploitation, privilege escalation, lateral movement |
| Web Application Security | OWASP Top 10, SQL injection, XSS, SSRF, authentication bypass |
| Red Team Operations | Adversary simulation, C2 infrastructure, detection evasion |
| Active Directory Attacks | Kerberoasting, Pass-the-Hash, BloodHound path analysis, DCSync |
| Cloud Security Testing | AWS & Azure misconfigurations, IAM abuse, privilege escalation |
| OSINT & Reconnaissance | Passive recon, footprinting, attack surface mapping |
| Security Reporting | Professional pentest reports, executive summaries, remediation guidance |
"Security is not a product, but a process." — Bruce Schneier
Effective security starts with thinking like an adversary. Every assessment I conduct follows the same systematic approach a real attacker would use — giving organizations an honest, evidence-based view of their exposure and clear, prioritized guidance for remediation.