I break systems to understand them, and I build tools to bulletproof them. A cybersecurity developer who engineers defense from scratch — low-level C++ anti-forensic engines, Python kernel monitors, zero-trace architectures.
I'm a BSc Computer Science student at Utkal University, Odisha — self-forging a path through offensive security, systems programming, and defense engineering. My philosophy: you can't defend a system if you don't understand exactly how it breaks.
I build real security tools from the ground up. No commercial shortcuts, no off-the-shelf solutions. From kernel-level inotify monitors to C++ disk-overwrite anti-forensics, every project is a proof of deep understanding.
Offensive, defensive, and systems capabilities I've built through real project work.
Security tools engineered from scratch. No off-the-shelf. No shortcuts.
A real-time Python and Bash security daemon hooking into Linux kernel inotify events to monitor critical system assets and generate persistent forensic audit logs. Detects unauthorized modifications, deletions, and suspicious access on sensitive files in real time.
A hardware-anchored, zero-trace messaging backend built with FastAPI, featuring a custom C++ engine that executes low-level disk overwrites to defeat forensic data recovery. Messages are cryptographically secured and leave no recoverable trace on disk post-deletion.
Academic foundation + relentless self-directed security training.
Core curriculum: data structures, algorithms, OS, computer networks, DBMS. Self-directed deep dives into Linux internals, systems programming, and practical cybersecurity engineering alongside formal coursework.
Continuous hands-on learning via TryHackMe, Google Career Certificates, and personal attack/defense lab environments. Deep focus on building custom security tooling from scratch rather than relying on existing frameworks.
Earned badges and the ones locked in my crosshairs.
CLASS: CONFIDENTIAL // TYPE: ENCRYPTED_DATA