[>_] A Capture The Flag (CTF) simulation is active. Access the terminal to join the game.
Available for Internships

Hi, I'm Aaditya.

//

I'm a 3rd-year CS student who genuinely loves breaking things apart to understand how they work — and then figuring out how to make them harder to break. Currently diving deep into pen testing, CTFs, and anything security-related.

A bit about me

Who I Am

I'm Aaditya, a 3rd-year Computer Science student at Chitkara University specializing in cybersecurity. It started with basic networking labs in first year and quickly turned into CTFs, bug bounties, and spending way too many late nights reading CVE disclosures.

Right now, I'm focused on penetration testing and network security, actively practising on platforms like HackTheBox and TryHackMe while working on tools that solve real problems. I believe the best way to learn security is to actually try to break stuff — ethically, of course.

Outside of that, I write about things I've learned, contribute to open source projects, and I'm actively looking for internship opportunities where I can apply what I know and grow alongside people who really know their stuff.

AD

Aaditya

CS Student / Security Enthusiast

  • DEGREEB.E Computer Science
  • YEAR3rd Year (2023–2027)
  • LOCATIONIndia
  • STATUSOpen to internships
  • INTERESTSPen Testing, CTFs, Bug Bounty, Malware Analysis, VAPT
Capabilities

What I Work With

Offensive Security

Pen Testing
Web App Sec
Exploitation
Social Engineering

Network & Systems

Traffic Analysis
Net Forensics
Linux / Unix
Active Directory

Development & Cloud

Python Scripting
JavaScript / Node
Operations

Things I've Built

ZTNA

Zero Trust Network Access Simulator

Built this to actually understand how ZTNA policy decisions work — device posture checks, identity context, behavioral analytics. It's a practical learning tool that turned into a proper project.

PythonFlaskCryptographyNetwork Auth
NMAP

Automated Nmap Report Tool

Nmap output is painful to read. So I built a tool that chains scans intelligently and spits out a clean, modern HTML report. Uses a bit of AI to adapt the scanning strategy.

PythonNmapHTML/CSSAI Integration
ADS

AI Phishing Detection System

Detects and flags phishing attempts using machine learning — analyzing email content, URLs, and sender patterns to identify malicious intent. Built initially as a security experiment, it evolved into a robust tool for real-time threat detection.

PythonNLPCybersecurityMachine Learning
NBM

Network Baseline Monitor

Monitors network traffic baselines and flags anomalies — beaconing patterns, lateral movement, unexpected spikes. Started as a uni project, grew into something I'm genuinely proud of.

PythonlibpcapTraffic AnalysisMachine Learning
CTF Competitions

Competitions I've Competed In

April 2026

MythX

@ KIET Group of Institutions

Achieved an outstanding 9th position in the offline final round of a national-level 24-hour Capture The Flag (CTF) competition, held at KIET College campus, demonstrating advanced technical skills and teamwork under high-pressure conditions.

March 2026

CREST CTF 2026

@ CREST Cyber Club - Pimpri Chinchwad University

Participated in an 8-hour team-based CTF organized by CREST Cyber Club (March 2026), collaborating in a team of four to solve challenges across cryptography, web security, forensics, and reverse engineering.

December 2025SYNT{e0g_gu3_j0eyq}

EY DSCI National CTF Hackathon - Top 40 out of 150+ teams

@ EY DSCI

Led a 2-person team through 8 straight hours of AD exploitation, binary reversing, and some genuinely evil forensics challenges.

Academic

Where I'm Studying

2023 – 2027

B.E in Computer Science

@ Chitkara University

Relevant Coursework: Network Security, Cryptography,Operating Systems, OOP

Credentials

Certifications

Identity Security Leader - Sailpoint

Sailpoint Technologies

Nov.2025

Introduction to Cybersecurity

Cisco Networking Academy

Oct.2025
Process

How I Approach Work

01

Reconnaissance

Before touching anything, I map out what I'm dealing with. Passive enumeration, OSINT, subdomain discovery — building a complete picture before the target even knows I'm looking.

02

Vulnerability Analysis

Automated scanners catch the obvious stuff. I go deeper — hunting logical flaws, auth bypasses, and misconfigs that tools consistently overlook.

03

Exploitation

This is where it gets interesting. Crafting exploits, chaining vulnerabilities, bypassing filters — and keeping meticulous notes of every step along the way.

04

Post Exploitation

Once in, the goal is showing real impact. Privilege escalation, pivoting through the network, and demonstrating what an attacker could actually get away with.

05

Reporting

A clear, developer-friendly report: technical details, working PoCs, risk ratings, and specific steps to fix things. No jargon for its own sake.

support

fuel the grind

If my work helped you, or you just vibe with the hustle — drop a coffee via UPI.

UPI ID9467854399@ptsbi
PAY_VIA_UPI
UPI QR Code

Scan to Support

Get In Touch

Say Hello

Whether you have a project in mind, want to talk security, or just want to say hi — I'm always happy to chat.

know the right address? try challenge 5/5 ↓

Designed & built by Aaditya  ·  Next.js, Tailwind, Framer Motion
© 2026 All Rights Reserved.