[Too Much info - this is only way] | LinkedIn


SUMMARY

Professional breaker and fixer of digital things. Documentation is gospel—way better than YouTube tutorials wasting your time.
Old OVA files? Absolute hypervisor headaches when it comes to networking.
Custom Linux builds? More like terminal tuxedo chaos—better off conjuring your own setup from CLI like a true shell sorcerer.
Web development in college felt like a golden ticket—until I realized entry-level jobs want 5 years experience and 10 projects fresh outta womb.
Then came cybersecurity. Love at first exploit. Now even Active Directory looks like a cursed maze with DNS demons whispering riddles.


SKILLS

Currently Learning

  • Active Directory (because there’s always another cursed forest)
  • Privilege Escalation (climbing ladders made of exploits)
  • Cloud Security (hacking the sky with billing alerts screaming)
  • Python Scripting (automate chaos with elegance)
  • Red Team Tactics (think like attacker, act like pro)
  • Writing Better Docs (because good notes = real root shell)

Already Fought (and Sometimes Won)

  • Hack The Box machines (pwned AD nightmares and dumb misconfigs)
  • Capture The Flags (solved flags, Googled madly, repeated)
  • Web App Vulns (XSS, SQLi, LFI, RCE — patched or exploited)
  • Tools of Chaos: BloodHound, Impacket, Burp Suite, linpeas, winpeas
  • Networking (NAT, port forwards, bridges, switches — sleep-configured)

EDUCATION

Bachelor of Computer Science Engineering
Chitkara University, Rajpura
July 2020 - August 2024
CGPA: 9.18
Relevant: Data Science, Network Basics, Web Development


Certifications


Projects

Wave Prediction Model

Tech: HTML, CSS, Python, JavaScript, LSTM
Built a user-friendly UI to analyze wave data using a Python-powered backend and ML model.

Home Lab Setup – Cybersecurity & Ethical Hacking

Designed, deployed, and maintained a custom cybersecurity lab environment replicating real-world enterprise infrastructure for penetration testing practice.

Lab Components: Kali Linux (attacker machine), multiple Windows Server VMs (Active Directory Domain Controller, Client Machines), vulnerable web servers, intentionally vulnerable machines (e.g., VulnHub, OWASP BWA).
Key Activities:

  • Configured Active Directory domain with Group Policies, user accounts, ACLs
  • Simulated real-world vulnerabilities for privilege escalation, lateral movement, and persistence techniques
  • Practiced internal network enumeration (BloodHound, SharpHound) and Kerberos attacks (Kerberoasting, Pass-the-Ticket)
  • Ran full kill chain exercises: reconnaissance → scanning → enumeration → exploitation → privilege escalation → post-exploitation Tools Used: Nmap, Metasploit, Burp Suite, Hydra, BloodHound, Impacket scripts, Responder, CrackMapExec

Impact: Built end-to-end offensive security workflow; gained hands-on experience simulating attacker methodologies in a controlled lab for continuous skill improvement.

Machine Learning + LLM-Powered Data Analysis Platform

Built a full-stack web platform enabling users to upload and analyze datasets in real-time.

Backend: Python (Flask), integrated Machine Learning models (scikit-learn, LSTM) to automate data preprocessing and predictions.
LLM Integration: Connected outputs to a locally running Large Language Model to generate interactive summaries, key insights, and recommendations.
Frontend: User-friendly dashboard built with HTML, CSS, JavaScript to visualize analysis results and predictions dynamically.
Key Impact: Reduced manual analysis effort; transformed static data into actionable insights using AI automation.


Contact Me

0x66xz@proton.me


"Hack the planet. Stay curious. Stay ethical." 🖤