Exploit Development
Pentesting
Linux
Python
C
Java
Frontend Development
x64 Assembly
I had the opportunity to intern at Leap Academy. During my time there, I gained valuable knowledge and hands-on experience in various areas, including Redhat Linux, AWS, Python, Docker, and more.
I embarked on my journey as a CTF player, aspiring to become an ethical hacker.
I assumed the role of CO-Head at the CGC Club in DIT University, focusing on cybersecurity initiatives.
I pursued my undergraduate studies at DIT University, graduating with a degree in BACHELOR OF TECHNOLOGY - BTECH, COMPUTER SCIENCE.
I completed my intermediate education in the PCM (Physics, Chemistry, Mathematics) stream at Academic Heights Public School (AHPS).
I completed my High School education from St. Xavier High School
I specialize in dissecting and understanding the intricacies of malicious software. My ability to unravel complex code, identify vulnerabilities, and provide effective solutions allows me to safeguard systems against cyber threats. Through meticulous analysis and insightful reporting, I play a crucial role in defending digital environments from harmful attacks.
I possess the skills and knowledge to uncover vulnerabilities within systems and networks, using cutting-edge tools and techniques. With a focus on security, I help organizations identify and address weaknesses before malicious hackers can exploit them. By conducting controlled and authorized penetration tests, I assist in strengthening defenses, ensuring robust protection against potential cyber threats.
I simulate real-world cyber attacks to evaluate the security of systems, networks, and applications. By employing advanced techniques and methodologies, I uncover vulnerabilities and provide comprehensive reports with actionable recommendations. Through meticulous testing, I assist organizations in proactively strengthening their defenses and ensuring the confidentiality, integrity, and availability of their digital assets.
I adhere to the principles of clean code. By writing clear, concise, and well-organized code, I strive to enhance readability, maintainability, and overall software quality. I prioritize code simplicity, proper naming conventions, and modular design, resulting in more efficient development, easier debugging, and a better user experience.
I excel in bug hunting. Using a combination of manual testing, automated tools, and creative thinking, I diligently search for security flaws and functional issues within applications and systems. By reporting these bugs to developers, I contribute to improving the overall quality and security of software, ensuring a smoother and safer user experience.
I provide exceptional support to ensure a positive user experience. I am dedicated to promptly addressing inquiries, resolving issues, and guiding users through technical challenges. By actively listening and empathizing with customers, I strive to deliver personalized and effective solutions. With my strong communication skills and technical expertise, I am committed to delivering outstanding support that exceeds expectations.
Scanner and Patcher
Scanner and Patcher is a software which comes with a set of web vulnerability scanners and it provides patches for it. In this we are using powerful and specialized tools which enable us to carefully and thoroughly scan the given web application for a wide array of vulnerabilities. We have designed a solution where once a target web application has been entered in the program, the entire process can easily run without any need to monitor it. As for our patcher we have developed specific patches to patch vulnerabilities.
MalwareXpose
MalwareXpose is a powerful Windows debugger developed entirely in Delphi. This tool is designed to assist malware analysts in their analysis process, aiming to improve their response time and efficiency
Deathnote
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.
Secure System
Secure System is implementation of a secure file transfer system using hybrid encryption technique, compression, and authentication. The system utilizes RSA encryption, PKCS1_OAEP padding, zlib compression, and SHA256 authentication to ensure data security during transfer.
CVE-2022-36537
R1Soft Server Backup Manager uses the ZK framework as the main framework. Its security requires all Web3 project parties to pay more attention to the security vulnerabilities of various Web3 infrastructures and patch them in time to avoid potential security risks and digital asset losses
Msg Encoder-Decoder
The project aims to develop a graphical user interface (GUI) application that utilizes base64 encryption algorithm to encrypt and decrypt text. It provides user-friendly input options for text, key, and encryption/decryption selection, with the output displayed in a text field.
All Blogs
Collection of all my blogs links and Writeup links
+919696622717
ojhakushagra73@gmail.com
Uttar Pradesh, India
Category - Web Application
Lorem ipsum dolor, sit Lorem ipsum dolor sit amet consectetur adipisicing elit. Quidem perferendis corporis culpa! amet consectetur adipisicing elit. Hic doloribus labore assumenda nostrum commodi. Officia. Lorem ipsum dolor sit amet consectetur adipisicing elit. Incidunt.