🕶️ Yuvraj Singh

Ethical Hacker | Penetration Tester | Web Security Enthusiast | Python Developer


💻 Summary

🕵️ Ethical hacker with hands-on experience in penetration testing, scripting, and real-world attack simulations via a custom home lab and Hack The Box.
⚡ Skilled in Python, Burp Suite, Nmap, Metasploit.
🎯 Focused on web security & offensive automation.


🧰 Skills

🔐 Penetration Testing & Exploitation:

  • Burp Suite, Metasploit, SQLMap, Hydra, BloodHound, Nikto
  • Active Directory attacks: Kerberoasting, Pass-the-Hash, Privilege Escalation
  • Web Vulnerability Scanning: ffuf, Gobuster, Dirb

🏹 Reconnaissance & Enumeration:

  • Nmap, ffuf, Gobuster, Sublist3r
  • DNS Enumeration, Port Scanning

🐍 Scripting & Automation:

  • Python for security automation, exploit scripts, data parsing

🧑‍💻 Operating Systems & Platforms:

  • Kali Linux, Windows, WSL2
  • VirtualBox, VMware, Custom Virtual Labs

🌐 Web Development & AI Integration:

  • HTML, CSS, JavaScript
  • Flask (Python backend), Machine Learning models (LSTM, scikit-learn)
  • LLM integration for data-driven insights (Experiments)

🎓 Education

Bachelor of Computer Science Engineering
Chitkara University, Rajpura
📅 July 2020 – August 2024
💯 CGPA: 9.18

Courses: Data Science, Computer Science, Network Basics, Web Development


🏆 Certifications


🚀 Projects

🔬 Wave Prediction Model

Tech: HTML, CSS, Python, JavaScript, LSTM
Built a user-friendly UI to analyze wave data using a Python-powered backend and ML model.

🏗️ Home Lab Setup – Cybersecurity & Ethical Hacking

Designed, deployed, and maintained a custom cybersecurity lab environment replicating real-world enterprise infrastructure for penetration testing practice.

✔️ Lab Components: Kali Linux (attacker machine), multiple Windows Server VMs (Active Directory Domain Controller, Client Machines), vulnerable web servers, intentionally vulnerable machines (e.g., VulnHub, OWASP BWA).
✔️ Key Activities:

  • Configured Active Directory domain with Group Policies, user accounts, ACLs
  • Simulated real-world vulnerabilities for privilege escalation, lateral movement, and persistence techniques
  • Practiced internal network enumeration (BloodHound, SharpHound) and Kerberos attacks (Kerberoasting, Pass-the-Ticket)
  • Ran full kill chain exercises: reconnaissance → scanning → enumeration → exploitation → privilege escalation → post-exploitation ✔️ Tools Used: Nmap, Metasploit, Burp Suite, Hydra, BloodHound, Impacket scripts, Responder, CrackMapExec

🏆 Impact: Built end-to-end offensive security workflow; gained hands-on experience simulating attacker methodologies in a controlled lab for continuous skill improvement.

🤖 Machine Learning + LLM-Powered Data Analysis Platform

Built a full-stack web platform enabling users to upload and analyze datasets in real-time.

✔️ Backend: Python (Flask), integrated Machine Learning models (scikit-learn, LSTM) to automate data preprocessing and predictions.
✔️ LLM Integration: Connected outputs to a locally running Large Language Model to generate interactive summaries, key insights, and recommendations.
✔️ Frontend: User-friendly dashboard built with HTML, CSS, JavaScript to visualize analysis results and predictions dynamically.
✔️ Key Impact: Reduced manual analysis effort; transformed static data into actionable insights using AI automation.


📬 Contact Me

📧 0x66xz@proton.me
🌐 LinkedIn


"Hack the planet. Stay curious. Stay ethical." 🖤