Available for opportunities

Rohith S

|

Breaking things responsibly — finding vulnerabilities before the bad guys do.

50+
CTF Challenges
10+
Projects
100+
THM Rooms

$ cat about.txt

About Me

I'm a passionate cybersecurity student and ethical hacker with a focus on offensive security, web application vulnerabilities, and network penetration testing. I spend my time breaking things responsibly — finding vulnerabilities before the bad guys do. Currently pursuing a career in cybersecurity with hands-on experience in CTF competitions, bug bounty programs, and real-world penetration testing labs.

📍 India🎓 CS Student🐛 Bug Hunter
rohith@kali:~$ whoami --verbose
Role: Ethical Hacker
Focus: Offensive Security
Status: ● Active
Networking
TCP/IPDNSHTTP/SVPNFirewallWireshark
Web Security
OWASP Top 10Burp SuiteSQLiXSSCSRFIDOR
Linux
Kali LinuxBash ScriptingPrivilege Escalationcroniptables
Bug Bounty
HackerOneBugcrowdReconSubdomain EnumCVSS Scoring

$ ls -la ./projects

Featured Work

Featured

VulnScanner Pro

Automated vulnerability scanning tool that chains Nmap, Nikto, and custom exploit checks into a single automated pipeline. Detects OWASP Top 10 vulnerabilities with detailed reporting.

AutomationReconOWASP
PythonNmapNiktoSQLiteFlask
Featured

XSS Hunter Lab

Custom lab environment for testing and demonstrating Cross-Site Scripting vulnerabilities. Includes DOM-based, Reflected, and Stored XSS scenarios with educational writeups.

XSSWeb SecurityLabs
JavaScriptNode.jsExpressDocker

SQLi Exploitation Framework

Educational SQL injection testing framework built from scratch. Supports error-based, blind, and time-based injection with automated payload generation against test targets.

SQLiDatabaseAutomation
PythonMySQLSQLiteClick CLI
Featured

Metasploitable Engagement Report

Full penetration testing engagement against Metasploitable 2 environment. Complete with reconnaissance, exploitation, privilege escalation, and professional PDF report.

Red TeamFull EngagementReporting
MetasploitNmapKali LinuxLaTeX

Network Packet Analyzer

Custom packet capture and analysis tool using Scapy. Detects anomalous traffic patterns, ARP spoofing attempts, and suspicious DNS queries in real-time.

NetworkDFIRDetection
PythonScapyWiresharkLinux

CTF Writeup Collection

Curated collection of detailed CTF challenge writeups covering crypto, web, pwn, and forensics categories from platforms like HackTheBox, TryHackMe, and PicoCTF.

CTFHackTheBoxTryHackMe
PythonGDBGhidraCyberChef

$ skill --list --verbose

Technical Arsenal

🗡️

Offensive Security

Penetration Testing10%
Bug Bounty Hunting20%
Web App Security30%
Network Recon5%
Social Engineering5%
💻

Programming

Python90%
Java90%
OOPS50%
Bash/Shell50%
JavaScript50%
SQL50%
C/C++70%
🔧

Security Tools

Burp Suite90%
Nmap / Masscan70%
Metasploit50%
Wireshark70%
SQLMap / ffuf10%

[SYSTEM] Skill acquisition in progress...

Continuously learning · OSCP In Progress · Next: Advanced Exploit Development

OSCP PrepExploit DevRed TeamMalware Analysis

$ git log --oneline

My Journey

🎓 education2022-2023

SSLC

Sri Vidya Mandir Matriculation School

🎯 86.8%

Completed 10th grade and began exploring the fundamentals of computers and networking. This phase sparked my curiosity about system behavior, security, and how digital systems operate behind the scenes — laying the foundation for my journey into cybersecurity.

🎓 education2024-2025

HSC

Kongu Vellalar Matriculation Higher Secondary School

🎯 86.5%

Completed 12th grade while diving into programming with Python and C++. Built a strong foundation in logic, problem-solving, and system-level thinking, which later became the base for exploring cybersecurity and scripting for automation.

🎓 education2025-present

B.E in Computer Science and Engineering(Cyber Security)

K.S.R College of Engineering

🎯 8.435 CGPA

Currently pursuing my college degree while actively building practical skills in cybersecurity. Working on hands-on labs using Kali Linux and vulnerable environments, exploring networking, system behavior, and real-world security vulnerabilities to develop an offensive security mindset.

🎓 education2025

Cybersecurity Bootcamp

Self-Directed / Udemy / YouTube

Completed comprehensive ethical hacking curriculum covering networking, web app security, exploit development, and OSCP-prep material.

🖥️ platform2025

TryHackMe — Top 85%

TryHackMe

Completed 5+ rooms across offensive security, OSINT, and forensics tracks. Ranked in the top 5% globally.

🏆 achievement2026

Bug Bounty Hunter

HackerOne / Bugcrowd

Actively participating in bug bounty programs — discovered and responsibly disclosed XSS, IDOR, and authentication bypass vulnerabilities.

⚔️ competition2026

CTF Competitions

picoCTF / CTFtime

Competed in national and international CTF events, placing in top 20% in web exploitation and cryptography categories.

$ ./live_demo.sh

Live Terminal

Watch a simulated penetration testing session. This is what a typical recon and exploitation workflow looks like.

root@kali — ~/pentest● LIVE
root@kali:~/pentest# whoami
root@kali:~/pentest#
⚠️ All testing performed on authorized targets only — ethical hacking principles apply

$ ping me

Get In Touch

Have a project, opportunity, or just want to talk security? My inbox is always open.

Contact Info

📍India
Available for work
Average response time: <24 hours