The best thing about a boolean is even if you are wrong, you are only off by a bit
• Conducted in-depth analysis of security vulnerabilities to identify potential exploits.
• Developed Proof-of-Concept (PoC) exploits for identified vulnerabilities, contributing to improved product security.
• Collaborated with cross-functional teams to prioritize and address critical vulnerabilities, enhancing product resilience.
• Created and maintained dockerized victim environments for testing and validating security findings, ensuring accurate replication of real-world scenarios.
• Contributed to the company’s knowledge base by documenting research findings, methodologies, and exploit techniques.
• Assisted in implementing SIEM tools to gain hands-on experience with robust security strategies.
• Performed vulnerability scans using Nessus and OpenVAS, supporting vulnerability assessments.
• Utilized threat intelligence feeds and monitored security tools to identify IOCs and threats.
• Developed playbooks and runbooks within SOAR platforms as training for incident response processes.
GPA : 4.0/4.0*
CGPA : 7.64/10.00
A series of Proof-of-Concept Exploits written to access data from ERP, Acharya Nagarjuna University. Bugs disclosed responsibly.
Developed a new Natural Language Processing based paradigm to detect Code Injection attack attempts. Classification Model peaked at 97.5% accuracy with the ability to detect XSS, SQLi and CMDi.
Exploit for a CAN Bus, to avail scenarios such as Denial of Service and Frame Spoofing
Reference : "Error Handling of In-vehicle Networks Makes Them Vulnerable"
PING : Professor Information Gatherer. A Google Scholar Based, Information Retrieval System to gather Professor Information and Ranking based on Jaccard Similarity. Written in Python.
A central repository built to store Question Papers, Notes, Slides, PDFs, etc. Backend developed in Django.