Skip to content
View R-Santhoshkumar's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report R-Santhoshkumar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
R-Santhoshkumar/README.md

Typing SVG


πŸ₯· whoami

cybertron@kali:~$ cat about_me.txt

I am an M.Tech Computer Science Engineering candidate specializing in Cybersecurity. Operating at the intersection of Penetration Testing (VAPT), Cloud Infrastructure (Azure/AWS), and Digital Forensics. I build secure networks and automate vulnerability detection with Python.

  • 🎯 Mission: Securing infrastructure & developing advanced Red Team tooling.
  • πŸŽ“ Clearance: M.Tech (6 Years Integrated) with focus on Cryptography & Network Security.
  • 🚩 CTF Player: Exploiting web vulnerabilities and climbing ranks on TryHackMe.

πŸ› οΈ ls -la /usr/bin/skills



Category Arsenal
Offensive Security Metasploit, Nmap, Burp Suite, VAPT, SQLi/XSS/RCE
Defensive Security Wireshark, Snort IDS, Nessus, SIEM, Firewall Config
Cloud Security Azure (VNet, Bastion, NSG), AWS (EC2, VPC, IAM)
Digital Forensics Autopsy, Hash Validation, Disk Imaging, Incident Response
Networking Cisco CCNA, OSPF, NAT/PAT, ACLs, Segmentation
Systems & Code Linux (Kali, RHEL, Ubuntu), Python, Bash, SQL

πŸ“ cd ./featured_operations

πŸ”₯ Operation: Vulnerability Scanners Suite

Developed custom Python CLI tools for automated detection of web vulnerabilities.

  • SQLi Scanner: Payload injection testing & structured reporting.
  • XSS Scanner: Parameter-based reflection validation.
  • Command Injection Tool: System output analysis for shell flaws.
  • Tech: Python, Requests, DVWA, Juice Shop
πŸ•΅οΈ Operation: Digital Forensic Deep-Dive

Executed comprehensive forensic analysis on 2GB disk images.

  • Recovered 500+ deleted files (NTFS/FAT) using Autopsy.
  • Performed hash validation (MD5/SHA) and entropy checks to preserve evidence chain.
  • Tech: Autopsy, Hashcat, EnCase concepts
πŸ—οΈ Operation: Secure Cloud Infrastructure

Architected hardened enterprise networks in simulated and cloud environments.

  • Implemented Azure VNet Peering and Network Security Groups (NSGs), dropping unauthorized access by 75%.
  • Designed a 50+ host Cisco enterprise network with OSPF and strict ACLs.
  • Tech: Azure, Cisco Packet Tracer, Routing Protocols

πŸ“œ cat /etc/certifications

- Google Cybersecurity Professional Certificate (Coursera)
- Cisco CCNAv7: 
    - Introduction to Networks
    - Switching, Routing, and Wireless Essentials
    - Enterprise Networking, Security & Automation
- Red Hat System Administration (Training)
- Infosys Springboard: Fundamentals of Cryptography

πŸ“Š htop (GitHub Stats)

GitHub Stats GitHub Streak


πŸ“‘ ping -c 4 R-Santhoshkumar

EOF. Connection closed by foreign host.

Popular repositories Loading

  1. wazuh-soc-home-lab wazuh-soc-home-lab Public

    Multi-endpoint SOC home lab using Wazuh SIEM for centralized monitoring, vulnerability detection, and endpoint security analysis.

    2

  2. Library-Management Library-Management Public

    A Fully functional react website that take care of the librarian work in online

    JavaScript

  3. R-Santhoshkumar R-Santhoshkumar Public

  4. Personal-Portfolio Personal-Portfolio Public

    This is my Personal Portfolio

    TypeScript

  5. injectsuite-cli injectsuite-cli Public

    Modular injection detection suite featuring SQLi, XSS, and CMDi scanning modules with a rich CLI interface. Built for automated security validation and ethical hacking.

    Python