Contact US

Proven IT-Security specialist with having more than dozen of exploit published online in, exploitdb, packetstorm, securityweek, author of few 0day and CVE, Author of K-auth authentication system and I-IPS (software appliance for IPS/IDS for small and large scale organization),Listed in few hall of fames like Apple, Nokia etc, conducted N number of VA/WA/PT for Reputed client, Implemented SIEM/SOC at large Media House, expertise in log analysis, scripting, technical audit, Linux, windows, Areas of interest in Information Security domain are: Buffer Overflows, exploitation, Reverse Engineering, Shell coding, Tool building, Malware analysis and IDS. Active Participant in Null community, designed CTF which was still unbreakable, Currently working as Sr.Security analyst at network intelligence India Pvt .Ltd prior to security 3 years of extensive experience in administration,
||Security enthusiastic || Love Coding reverse engineering Exploitation || Security analyst || Linux
  • My Linkedin Profile :
  • You can follow me.  :
  • My Blog  :
  • My Videos  :


  1. Hey I would like to offer you a little job if that's possible, my email -


Post a Comment