I am an graduate from IGNOU University. I have a bachelor's degree in BCA and a specialisation in Cyber security. I was born in kerala . I tend to be good with socialising with others. This in turn has helped me very much to work efficiently in groups. As of now, I am a certified Ethical Hacker, a passionate Cyber security analyst and Bug Hunter, a vivid traveller....
See MoreI am a highly motivated cyber security student with a CEH certification and a strong foundation in computer systems, programming, and networking. I have completed coursework in cyber security, including topics in network security, data security, and cyber law. In addition, I have gained hands-on experience through internships and projects focused on cyber security. I have also participated in cyber security competitions and hackathons, and have a strong ability to identify and analyze threats. My CEH certification demonstrates my commitment to ethical hacking practices and my ability to apply my knowledge in a professional setting. .
See MoreAs a skilled cyber security analyst and bug hunter with a CEH certification, I offer a range of services to help organizations protect their systems and data from threats. My services include penetration testing and bug hunting . With my technical skills and ethical approach, I am well-equipped to help you secure your systems and protect your data from unauthorized access.
I as a Security analysts can monitor, prevent, and stop attacks on private data. These digital professionals create and implement firewalls and software systems to protect data and network infrastructures.
With a keen interest in Front-end Development, skills in HTML,CSS,Javascript and a thorough understand of a user point of view leads me to be involved in Web Development.
I as a bug bounty hunter a person who searches for and reports vulnerabilities in software or online systems, often for financial rewards. These vulnerabilities, also known as "bugs," can allow an attacker to gain unauthorized access to a system or steal sensitive information. Bug bounty programs are a way for companies to identify and fix vulnerabilities in their systems before they can be exploited by malicious actors
This is a custom tool built with an easy understanding that helps anyone test the integrity and strength of a secure WPA2 Wifi or Hotspot. It can also be used to crack the password and gain access into the router to get free data.
The Breach Checker Telegram Bot is a tool that allows users to check if their personal information has been compromised in a data breach using the popular messaging app, Telegram.The bot is designed to be convenient and easy to use .
A working prototype and an App of a Home automation with all sensors required to provide utmost comfort with security and cryptography involved for application security.
A website Vulnerability Analyzer with an exploitation option that enables anyone to check the safety of a website and if neccessary crack in.