Red & Purple Team Specialist
I’m a cybersecurity professional with over years of experience in Red Team, Purple Team, and advanced penetration testing across BFSI, e-commerce, and enterprise environments. My work blends technical precision with strategic thinking — from simulating real world attacks using MITRE ATT&CK tactics to advising leadership on risk mitigation and secure architecture design.
I’ve led complex offensive security engagements, consistently breaching high-value targets, bypassing advanced defenses, and uncovering critical vulnerabilities in web, API, and thick-client applications. Beyond the tests themselves, I focus on building automation, hardening systems, and ensuring findings translate into meaningful security improvements.
Outside of client work, I contribute to the community through free courses, research publications, and the occasional open-source tool release. My mission is simple: to make security smarter, sharper, and more resilient — one engagement at a time.
Bachelor of Computer Application (BCA) - TMV University / L.F Polytechnic
CGPA 7.48
Lead enterprise-grade Red Team engagements simulating advanced, persistent threats targeting critical infrastructure and high-value assets.
Performed extensive VAPT across network infrastructure, web applications, and APIs for a major client in the BFSI sector, identifying and exploiting high/critical vulnerabilities.
Delivered security services to multiple clients in BFSI and healthcare sectors, focusing on both preventive and offensive measures.
Delivered training programs for students on CEH, ECSA, and OSCP, covering core penetration testing methodologies, tools, and real-world exploitation techniques.
Custom automation framework to accelerate common red-team tasks. Developed to streamline security assessment workflows, automate repetitive actions, and enhance team efficiency during engagements.
Advanced offensive utility targeting MSSQL attack paths. Features privilege escalation techniques, lateral movement capabilities, and data exfiltration methods specifically designed for Microsoft SQL Server environments.
Specialized proxy DLL generator for exploiting DLL hijacking vulnerabilities. Creates proxy DLLs that forward function calls while executing custom payloads, enabling sophisticated persistence and privilege escalation attacks.
YouTube + GitBook content for the security community. Educational resources designed to share cybersecurity knowledge and best practices.
Weekly cybersecurity tutorials, threat analysis, and industry insights
Published in Pentest Magazine
Read ArticlePublished in Pentest Magazine
Read ArticleMultiple CVEs discovered and published:
Security Consulting, Red Team Engagements, Security Architecture Design
Typically within 24-48 hours for professional inquiries
Offensive security specialists who simulate real-world attacks
Defensive security specialists who detect and respond to threats
Integration of red and blue team capabilities for enhanced security