The best thing about a boolean is even if you are wrong, you are only off by a bit
• Achieved 100% vulnerability assessment coverage across 50+ Dell servers, leading to the prioritization and remediation of 10+ critical vulnerabilities.
• collaborated with development teams to remediate 5 critical vulnerabilities within a 30-day timeframe, directly enhancing product security and reducing risk for Dell customers.
• Contributed to a 15% reduction in incident response time by assisting in the resolution of 3 high-priority security incidents, utilizing effective log analysis and containment strategies.
• Developed mitigation strategies for 5 emerging threats targeting Dell technology stack, proactively enhancing security posture using in-depth security research.
• Achieved 150% reduction in network attack surface by closing 30 unused ports (including FTP and TELNET) on 20 devices, bolstering security posture.
• Developed a custom tool to monitor 30 network assets, achieving a 40% reduction in downtime through performance mainte- nance.
• Enhanced exploit development efficiency by automating payload generation and result analysis with Python, improving work- flow and potential scalability.
GPA : 4.0/4.0*
CGPA : 7.64/10.00
A series of Proof-of-Concept Exploits written to access data from ERP, Acharya Nagarjuna University. Bugs disclosed responsibly.
Developed a new Natural Language Processing based paradigm to detect Code Injection attack attempts. Classification Model peaked at 97.5% accuracy with the ability to detect XSS, SQLi and CMDi.
Exploit for a CAN Bus, to avail scenarios such as Denial of Service and Frame Spoofing
Reference : "Error Handling of In-vehicle Networks Makes Them Vulnerable"
PING : Professor Information Gatherer. A Google Scholar Based, Information Retrieval System to gather Professor Information and Ranking based on Jaccard Similarity. Written in Python.
A central repository built to store Question Papers, Notes, Slides, PDFs, etc. Backend developed in Django.