CYBERSECURITY PROFESSIONAL

SOC ANALYSTRED TEAMPENTEST

Penetration Testing Web Exploitation Network Security Incident Response OSINT

Breaking systems ethically so they can't be broken maliciously — full-lifecycle offensive security from recon to remediation report.

prakash@kali ~ live
AVAILABLE FOR ENGAGEMENTS
3+
Projects
8
Skill Domains
CTF
Competitor
BB
Bug Bounty
Featured Work

PROJECTS &
CASE STUDIES

ALL PROJECTS →
MALWARE ANALYSIS REVERSE ENG

WANNACRY ANALYSIS

Static + dynamic analysis of WannaCry ransomware. Documented EternalBlue propagation chain, AES-RSA encryption routine, and C2 comms in a sandboxed environment.

↑ Full kill chain documented CASE STUDY →
NETWORK SEC IDS

NETWORK MONITORING LAB

Home lab with live traffic capture. Custom Snort IDS rules detecting port scans, brute-force attempts, and anomalous payloads with full alert correlation.

↑ 12 custom IDS rules written CASE STUDY →
HARDENING AUDIT

LYNIS SECURITY AUDIT

CIS-benchmark Linux server audit. Identified and remediated SSH misconfigs, kernel parameters, and service exposure with before/after compliance scoring.

↑ Hardening score +38 pts CASE STUDY →
Capabilities

SKILLS
OVERVIEW

FULL STACK →
OFFENSIVE SECURITY

Web exploitation, network attacks, post-exploitation, and red team operations.

Web Exploitation
Network Attacks
Privilege Escalation
API Security
RECON & OSINT

Passive and active reconnaissance, subdomain enumeration, and attack surface mapping.

OSINT
Subdomain Enum
DNS Analysis
Attack Surface Map
TOOLS & AUTOMATION

Framework proficiency, scripting, and custom tooling development.

Burp Suite
Metasploit
Python Scripting
Bash / CLI
DEFENSIVE AWARENESS

Blue team perspective, log analysis, and detection engineering.

SIEM / Log Analysis
Incident Response
MITRE ATT&CK
Threat Hunting
Active Practice

LABS &
PLATFORMS

[THM]
TRYHACKME
Add your rank

Guided learning paths — web exploitation, AD, privilege escalation.

PROFILE →
[HTB]
HACK THE BOX
Add your rank

Real-world lab machines simulating enterprise environments.

PROFILE →
[BB]
BUG BOUNTY
HackerOne / Bugcrowd

Responsible disclosure on live programmes with real impact.

PROFILE →
[CTF]
CTF COMPETITIONS
CTFtime.org

Forensics, crypto, web, pwn, and reverse engineering challenges.

CTFTIME →
Contact

AVAILABLE FOR
ENGAGEMENTS

Open to penetration testing contracts, SOC analyst roles, and bug bounty collaboration. Let's work together.

contact@erprakashmijar.com