Background
About Me
— Profile —
Education
B.Tech Computer Science VIT, Mumbai 2024 - 2028
Higher Secondary Kendriya Vidyalaya Vayusena Nagar 2023
Specialization
Cybersecurity Offensive & Defensive Security
Web Development Full-Stack Architecture
Core Competencies
Communication
Character Lore
Professional Inventory
Key Artifacts (Education)
B.Tech Computer Science VIT Mumbai | Specialized in Security (Expected 2026)
Sem 4 Coursework Computer Networks, OS, Database Systems, Cryptography
Toolbelt (Technical)
Pentesting Burp Suite, Nmap, Metasploit, Wireshark
Development Next.js, Node.js, Python (Automation), Git
Lore (Experience)
Lead Developer Code Doctor | Intelligence-driven code analysis tool
Security Researcher PSTS | Vulnerability modeling and mitigation
Technical Arsenal
Field Expertise
— Mastery —
Offensive Security
Defensive & Infrastructure
Development Core
Operating Systems
Talismans of Proof
Certifications
CompTIA Security+
CompTIA
Candidate / In-ProgressTryHackMe - Pre-Security
TryHackMe
CompletedIntroduction to Cybersecurity
Cisco Networking Academy
CompletedTactical Intel
Cybersecurity Presence
Top 5% TryHackMe Rank
Script Kiddie HackTheBox Rank
15+ Machines Pwned
4 CTFs Participated
Portfolio
Major Works
— Contributions —
01
Code Doctor
Lead Developer- ◇ Automated source code analysis and bug detection tool.
- ◇ Implemented intelligent diagnostic systems for code health.
- ◇ Integrated with modern development workflows.
02
Matrix Mind
Full-Stack Developer- ◇ Complex data visualization platform for cognitive mapping.
- ◇ Optimized rendering of matrix structures for performance.
- ◇ Secure user authentication and data persistence.
03
B-Tech Academic Hub
Architect- ◇ Centralized repository for academic resources and project tracking.
- ◇ Streamlined access to course materials and milestones.
- ◇ Built with a focus on performance and accessibility.
04
PSTS Security System
Security Researcher- ◇ Research into secure protocol implementations and threat modeling.
- ◇ Analyzed vulnerabilities in standard authentication mechanisms.
- ◇ Developed mitigation strategies for common attack vectors.
Get In Touch
Contact
Ready to collaborate on innovative solutions and security challenges.