About Me
$ whoami
I am a Certified Ethical Hacker (CEH v13) currently pursuing B.Tech CSE (Cyber Security) at Bennett University. I have hands-on experience in CVE analysis, SIEM development, and building AI-powered security tools. Passionate about threat detection, automation, and securing systems through collaborative projects.
Here are some technologies I have been working with:
▹Python Scripting
▹Nmap
▹Bash Scripting
▹PortSwigger
▹Linux
▹Elastic Stack (SIEM)

Experience
Cybersecurity Intern
Jun 2025 – Aug 2025Cisco Networking Academy — AICTE Virtual Internship Program
Junior Research Team Member
2023 – 2025Cipher — Cybersecurity Club, Bennett University
Projects
Scythe (WIP)
An AI-powered security testing terminal designed for pentesters, security analysts, and bug bounty hunters. Features multi-terminal support, automation, session tracking, and a built-in AI assistant.
Custom SIEM System
Developed a SIEM system for real-time monitoring, detection, and response to security events using Elastic Stack, MySQL, and Linux logs. Implemented automated alerts stored in MySQL for comprehensive analysis.
Web Profile
A personal web portfolio showcasing projects, research work, and blog posts. Also serves as a professional contact point.
Certifications
CEH v13
EC-Council
Certified Ethical Hacker — validating skills in penetration testing, vulnerability assessment, and ethical hacking methodologies.
Google Cybersecurity Professional
Coursera — Google
Professional certificate covering security operations, risk management, threat analysis, and incident response fundamentals.
Blog
Scythe: An AI-Powered Cybersecurity Workbench
A deep dive into the Scythe project — exploring its architecture, the problems it solves, its technical components, and the lessons learned during development.
Research
Quantum-Enhanced Hybrid LSTM-CNN for IoT Intrusion Detection
OngoingA high-performance intrusion detection framework for IoT environments, integrating Quantum Computing into a Hybrid LSTM-CNN architecture to improve threat detection for DDoS, botnet activity, reconnaissance, and data exfiltration.