> whoami
Exploiting systems from Ring 3 to Ring 0. Primarily focused on Linux kernel internals and reverse engineering, with cross-platform expertise in Android and foundational Windows user-space architecture.
I am a third-year engineering student at Dwarkadas J. Sanghvi College of Engineering, maintaining a 9.46 CGPA. My journey in cybersecurity started with web vulnerabilities and CTFs, but my true passion lies in the architecture that runs beneath it all.
I have completed an Industry Internship at Deloitte and a Research Internship at VJTI, diving deep into reverse engineering using Ghidra and IDA. My primary research and exploitation focus is on Linux systems and kernel internals. However, my offensive security capabilities are cross-platform, backed by a strong working knowledge of Android architectures and basic user-level Windows fundamentals.
Computer Engineering
Academic Standing
Primary focus on Ring 0 vulnerabilities, Local Privilege Escalation (LPE), kernel module analysis, and advanced memory/page table manipulation within custom Linux environments.
Decompiling and reverse engineering applications. Proficient in dynamic instrumentation, analyzing Dalvik bytecode, bypassing root detection, and exploiting native JNI libraries.
Solid understanding of Windows user-space architecture and the PE file format. Experience with basic reverse engineering of Windows binaries and WinAPI analysis (focused entirely on user-land, pre-kernel level).
Currently researching Windows and linux drivers at a lower level and diving deep into Kernel exploitation, IOCTL, and Native APIs.
Switched completely to Linux (Kali and later Arch). Completed a Research Internship at VJTI in Reverse Engineering and built a web server entirely in x86 Assembly. Mastered tools like Ghidra and IDA.
Familiarized myself with network hacking tools like Scapy, tshark, and Netcat. Gained certifications in Cryptography, Hashing, and Ethical Hacking via Udemy.
Started delving into computers and programming. Became a Certified Developer in JavaScript, HTML, and CSS. Developed a strong grasp of C programming and Cookie Management.
Exploited speculative execution to bypass kernel isolation. Wrote a C tool to manually translate 4-level x86 page tables via side-channels to steal protected memory.
Built a fully functional HTTP server from scratch using pure Intel syntax assembly, handling raw socket connections and GET/POST parsing without high-level abstractions.
Cryptographic Protocol
A highly secure cryptographic protocol leveraging the no-cloning theorem, quantum tokens, and the SWAP test to ensure unforgeable data integrity.
AI-ML, IOT
A comprehensive research paper detailing the physical, chemical, and biological quality parameters and safety of borewell water sources.
AI-ML, Finance
We use different ML models to predict Option prices and XAI techniques to explain how the predictions were made
Cybersecurity, AI-ML
Make use of existing CVE's(Common Vulnerabilities and Exposures) to predict vulnerabilities in a system