Education Journey
Academic Foundations
Cybersecurity Student & Researcher
Academic Foundations
Industry Recognition
Verified Credentials
Vulnerability Assessment
Cross-Site Scripting
Injecting malicious scripts into trusted websites.
Cross-Site Request Forgery
Exploiting state-changing requests.
Code Injection
Defacing applications via improper input sanitation.
Insecure Direct Object Ref
Bypassing authorization to access private data.
Responsible Disclosure
Ethical reporting to secure the digital ecosystem.
Exploitation Frameworks
Web Security Testing
Advanced interception and analysis.
Automation & Scripting
Custom exploit development.
Operating Environment
Kali / Ubuntu architecture.
Network Scanning
Reconnaissance and mapping.
Traffic Analysis
Packet inspection and diagnostics.
A real-time face swap technology developed using Python and OpenCV. Engineered robust face detection algorithms to map facial landmarks.
Declassified