whoami

I'm an international graduate student at the University of Maryland, College Park, currently pursuing my Master's in Cybersecurity along with a Graduate Certificate in Cloud Engineering.

I'm actively seeking a cybersecurity co-op opportunity for Summer or Fall 2025 in the DMV area - where I can contribute, learn, and grow in real-world security environments.

You'll find me writing technical blogs, building and contributing to open-source security tools, and regularly participating in CTFs to sharpen my skills. Always open to learning, collaborating on projects, or tackling fun security challenges.

Let's stay in touch :)


Featured Projects

SOAR EDR Emulation

Emulating adversary techniques and automating D&R with LimaCharlie, Tines and Slack

Automation LimaCharlie Tines

burplabs

Automated python package for portswigger labs

python burplabs portswigger

Automated DevSecOps pipeline: Secure CI/CD Deployment

An automated vulnerability scanning pipeline which involves Cloud, AI and Security Integration.

Jenkins Docker OWASP

Obsidian sync from windows

PowerShell-based automation sets up your Obsidian vault to sync with a private GitHub repo

Powershell Automation Obsidian

CVEs

| CVE-2025-46203

  • Unifiedtransform v2.0 suffers from Broken Access Control, allowing students/teachers to access /students/edit/{id} and modify student records. Affects all v2.0 builds

| CVE-2025-46204

  • Unifiedtransform v2.0 suffers from Broken Access Control, allowing students/teachers to access /course/edit/{id} and modify course data. Affects all v2.0 builds

Certifications

BSCP
BSCP
July 2025
AWS
SAA
April 2025
CDSA
CDSA
March 2025
OSCP
OSCP
July 2024
Google
Google Cert
Sept 2023
eJPT
eJPTv2
May 2023
CEH
CEH
Feb 2023

Latest from Medium

React2Shell — CVE-2025–55182: Critical Vulnerability in React Server

Vuln with easy chain and CVSS:10 After so long i have been writing blog and I have been researching on this vuln. I know time has passed on this but …

Read More →

The Tunnel Without Walls Report — HTB Holmes

The Tunnel Without Walls Report — HTB Holmes Scenario: A memory dump from a connected Linux machine reveals covert network connections, fake …

Read More →

The Enduring Echo Report — HTB Holmes

The Enduring Echo Report — HTB Holmes Scenario: LeStrade passes a disk image artifacts to Watson. It’s one of the identified breach points, now …

Read More →