ABOUT
PRAKASH MIJAR
An offensive cybersecurity professional with hands-on experience across the full attack lifecycle — from initial recon through post-exploitation and reporting. I break things ethically so they can't be broken maliciously.
Passionate about web exploitation, Active Directory attack chains, and building automation tooling. Continuously sharpening skills through CTFs, bug bounty programmes, and home lab environments.
My approach is methodical: understand the target, enumerate thoroughly, exploit precisely, document completely, and provide actionable remediation — not just a list of vulnerabilities.
SKILLS
JOURNEY
Active CTF competitor, bug bounty hunter, and home lab practitioner. Building this portfolio to document methodology and findings.
Completing learning paths covering web exploitation, Active Directory attack chains, and privilege escalation on real lab machines.
WannaCry malware analysis, network monitoring lab, and Linux hardening audit — all documented as full case studies.