> whoami
Cybersecurity engineer specializing in AI red teaming, penetration testing, and vulnerability research. I break systems to make them resilient, with a strong focus on real-world attack paths and ethical security testing.
Recon & Scanning: Nmap, Shodan, theHarvester, Burp Suite
Exploitation: Metasploit, SQLMap, Hydra, John the Ripper
Vulnerability Assessment: Nessus, OpenVAS, OWASP ZAP, Metasploitable2
Red Teaming: Kali Linux, C2 Frameworks, Prompt Injection Testing
Scripting: Python, Bash, PowerShell
AI Red Teaming – Autonomous Agent Security Testing
Performed adversarial testing on autonomous AI agents to identify prompt injection, tool misuse, and memory poisoning vulnerabilities. Documented failure modes and proposed mitigation strategies.
Tools: Prompt engineering, custom payloads, Python
Vulnerability Assessment and Penetration Testing Lab
Designed and executed a controlled lab environment using Kali Linux and Metasploitable2 to conduct reconnaissance, exploitation, and CVE mapping.
Tools: Nmap, Metasploit, OpenVAS, Nessus
Ethical Phishing Simulation Platform
Built a phishing awareness simulation platform to measure user susceptibility and visualize engagement metrics.
Tools: Python, Flask, HTML, CSS