root@hariprasath:~#
SYSTEM_ONLINE: READY_FOR_DEPLOYMENT

HARIPRASATH

> Execute: _

// Initiating protocol: Ethical Hacking & Network Defense.
// Target: Transforming vulnerabilities into fortified assets.
// Status: Scanning for threats...

Avatar

/usr/bin/whoami

Securing the Grid.

> Currently compiling a B.E. in Cybersecurity. My architecture is built on Penetration Testing, Vuln Assessment, and Forensic Analysis.

I execute CTF challenges on TryHackMe & HackTheBox to elevate privileges in my knowledge base. From malware analysis to Python automation, I operate where code meets security.

White Hat
Blue Team

sudo apt-get install skills

Loading modules...

OS & Scripting

Kali Linux Bash Python3

Offensive Ops

Burp Suite Metasploit Nmap

Net Analysis

Wireshark Tcpdump Snort

./Repositories

Deployed payloads & scripts.

Python Port Scanner

> Multi-threaded CLI tool.
> Uses socket lib.
> Detects open services.

[Python] [Sockets]
Execute

CTF Writeups

> Documentation of exploits.
> Privilege Escalation methods.
> Root access paths.

[Markdown] [Pentest]
Read Logs

Vuln Scanner

> Automated XSS/SQLi detection.
> Payload injection.
> Report generation.

[Bash] [Auto]
Deploy

COLLABORATION_REQUEST

Download encrypted profile details (Resume).