🕶️ Yuvraj Singh
Ethical Hacker | Penetration Tester | Web Security Enthusiast | Python Developer
💻 Summary
🕵️ Ethical hacker with hands-on experience in penetration testing, scripting, and real-world attack simulations via a custom home lab and Hack The Box.
⚡ Skilled in Python, Burp Suite, Nmap, Metasploit.
🎯 Focused on web security & offensive automation.
🧰 Skills
🔐 Penetration Testing & Exploitation:
- Burp Suite, Metasploit, SQLMap, Hydra, BloodHound, Nikto
- Active Directory attacks: Kerberoasting, Pass-the-Hash, Privilege Escalation
- Web Vulnerability Scanning: ffuf, Gobuster, Dirb
🏹 Reconnaissance & Enumeration:
- Nmap, ffuf, Gobuster, Sublist3r
- DNS Enumeration, Port Scanning
🐍 Scripting & Automation:
- Python for security automation, exploit scripts, data parsing
🧑💻 Operating Systems & Platforms:
- Kali Linux, Windows, WSL2
- VirtualBox, VMware, Custom Virtual Labs
🌐 Web Development & AI Integration:
- HTML, CSS, JavaScript
- Flask (Python backend), Machine Learning models (LSTM, scikit-learn)
- LLM integration for data-driven insights (Experiments)
🎓 Education
Bachelor of Computer Science Engineering
Chitkara University, Rajpura
📅 July 2020 – August 2024
💯 CGPA: 9.18
Courses: Data Science, Computer Science, Network Basics, Web Development
🏆 Certifications
🚀 Projects
🔬 Wave Prediction Model
Tech: HTML, CSS, Python, JavaScript, LSTM
Built a user-friendly UI to analyze wave data using a Python-powered backend and ML model.
🏗️ Home Lab Setup – Cybersecurity & Ethical Hacking
Designed, deployed, and maintained a custom cybersecurity lab environment replicating real-world enterprise infrastructure for penetration testing practice.
✔️ Lab Components: Kali Linux (attacker machine), multiple Windows Server VMs (Active Directory Domain Controller, Client Machines), vulnerable web servers, intentionally vulnerable machines (e.g., VulnHub, OWASP BWA).
✔️ Key Activities:
- Configured Active Directory domain with Group Policies, user accounts, ACLs
- Simulated real-world vulnerabilities for privilege escalation, lateral movement, and persistence techniques
- Practiced internal network enumeration (BloodHound, SharpHound) and Kerberos attacks (Kerberoasting, Pass-the-Ticket)
- Ran full kill chain exercises: reconnaissance → scanning → enumeration → exploitation → privilege escalation → post-exploitation ✔️ Tools Used: Nmap, Metasploit, Burp Suite, Hydra, BloodHound, Impacket scripts, Responder, CrackMapExec
🏆 Impact: Built end-to-end offensive security workflow; gained hands-on experience simulating attacker methodologies in a controlled lab for continuous skill improvement.
🤖 Machine Learning + LLM-Powered Data Analysis Platform
Built a full-stack web platform enabling users to upload and analyze datasets in real-time.
✔️ Backend: Python (Flask), integrated Machine Learning models (scikit-learn, LSTM) to automate data preprocessing and predictions.
✔️ LLM Integration: Connected outputs to a locally running Large Language Model to generate interactive summaries, key insights, and recommendations.
✔️ Frontend: User-friendly dashboard built with HTML, CSS, JavaScript to visualize analysis results and predictions dynamically.
✔️ Key Impact: Reduced manual analysis effort; transformed static data into actionable insights using AI automation.
📬 Contact Me
"Hack the planet. Stay curious. Stay ethical." 🖤