Building robust security tools and enterprise solutions that protect organizations from evolving cyber threats. Specializing in compliance automation, threat detection, and secure infrastructure design.
Passionate about building tools that make the digital world safer
Expert in vulnerability assessment and penetration testing (VAPT). I build tools that identify and exploit vulnerabilities before attackers do — from web app security to deep & dark web reconnaissance.
Designing compliance scanners, log analysis engines with ML-powered threat detection (99%+ accuracy), and CIS benchmarking tools that continuously audit and harden systems against attack surfaces.
From Python backends to React.js frontends, Docker containers to AWS infrastructure — I architect end-to-end solutions including interactive cybersecurity labs, monitoring dashboards, and automated backup systems.
Building educational tools like ransomware awareness simulators and hands-on cybersecurity labs that train the next generation of security professionals in safe, containerized environments.
A collection of security tools and enterprise solutions I've built
A comprehensive enterprise-grade compliance scanner that performs deep audits on Windows machines to assess compliance readiness against industry standards (CIS, NIST, ISO 27001). Automates security checks across password policies, firewall rules, user access controls, registry settings, and service configurations — generating detailed PDF reports with risk scores and remediation steps.
AI-powered log analysis engine leveraging machine learning models to detect malicious activity with 99%+ accuracy. Ingests server logs in real-time to identify SQL injection attempts, DDoS attack patterns, path traversal exploits, XSS payloads, and brute-force login attacks. Features anomaly detection, behavioral analysis, and automated alert correlation for SOC teams.
Advanced OSINT reconnaissance tool that scans email addresses and domains against leaked databases from historical data breaches across the deep and dark web. Aggregates intelligence from paste sites, breach databases, and underground forums — generating comprehensive exposure reports detailing compromised credentials, leaked PII, and breach timeline analysis.
Cross-platform disaster recovery solution with intelligent backup agents for Windows and Linux servers. Performs incremental and full system backups — capturing OS state, configurations, databases, and application data — with seamless restoration to any cloud platform (AWS, Azure, GCP). Features automated scheduling, encryption at rest, and S3-compatible storage integration.
Native Android application that performs automated security posture assessments against CIS (Center for Internet Security) benchmarks. Evaluates device encryption, screen lock policies, developer options, USB debugging, app permissions, and network configurations — producing a detailed compliance scorecard with actionable hardening recommendations.
Full-stack interactive cybersecurity training platform with a browser-based Kali Linux terminal. Students practice real-world penetration testing — running Nmap scans, Metasploit exploits, and web app attacks against intentionally vulnerable targets (OWASP Juice Shop). Built with React.js frontend, Docker containerization, and automated lab provisioning via Terraform on AWS.
Educational ransomware simulation platform designed for corporate security awareness training. Safely demonstrates ransomware behavior — file encryption mechanics, ransom note delivery, and lateral movement patterns — without causing actual damage. Helps organizations train employees to recognize social engineering tactics and implement prevention strategies in a controlled sandbox.
Enterprise-grade employee monitoring solution with a lightweight agent deployed across workstations. Tracks browsing activity — recording URLs, browser types, timestamps, and session durations — feeding data to a centralized admin dashboard. Provides management with comprehensive visibility into web usage patterns, policy violations, and productivity analytics with exportable reports.
Automated server health monitoring agent that continuously tracks CPU and memory utilization across infrastructure. Triggers intelligent real-time alerts when resource thresholds are exceeded — including the top 5 processes consuming CPU and memory. Supports email/SMS notifications, historical trend analysis, and integrates with existing monitoring stacks for proactive incident response.
Tools and technologies I use to build secure, scalable solutions
Interested in a demo or collaboration? Let's talk.