about 0% scrolled
> Establishing encrypted tunnel... [OK]
> TLS 1.3 — AES-256-GCM — SHA-512 [OK]
> Biometric + OTP verified: HARJINDER SINGH [OK]
> Clearance granted: PENDING / WHITE HAT [OK]
> Defense portal online. Session active. [OK]
// OPERATOR IDENTITY

HARJINDER
SINGH

$

Penetration Tester & Security Analyst with a hands-on trajectory in red team operations, web application testing, and AD exploitation. Interning at Cynox Security LLP, CyberYaan & GPCSSI (Haryana Police). Pursuing HTB CPTS & CRTO.
All work is legal, authorized, and white-hat.

Red Teaming VAPT AD Exploitation OSINT Web Shells White Hat
$ neofetch --minimal
USERh4rj1nd3r51ngh
HOSTportfolio.local
LOCATIONLudhiana, Punjab, IN
ROLEPenetration Tester
STATUSACTIVE · WHITE HAT
CLEARANCEAUTHORIZED
UPTIME3+ YRS
SESSIONACTIVE
CERTS (WIP)HTB CPTS · CRTO
// LIVE ACTIVITY
ACTIVE Training session: CPTS Path — lab active
INFO Cynox Security LLP — pentest engagement
WARN CRTO course review — 37% complete
0+ YRS
LEARNING
0ACTIVE
INTERNSHIPS
0+ TOOLS
ARSENAL
0+ CTF
CHALLENGES
SCROLL ↓
// ABOUT
$ cat /home/harjinder/about.txt

Name: Harjinder Singh (aka Ankit)

Handle: h4rj1nd3r51ngh

Location: Ludhiana, Punjab, India

University: GNA University


I'm a cybersecurity enthusiast transitioning from academic learning to real-world professional application. I operate within legal penetration testing teams, performing full-stack offensive security assessments — from initial reconnaissance to exploitation and reporting.


Currently interning at Cynox Security LLP, CyberYaan, and working as a Cyber Warrior Intern at GPCSSI (Haryana Police). I believe in hands-on, lab-based skill building and pursue certifications that reflect real-world competency.


All cybersecurity work described here is authorized, legal, and white-hat.

// CAPABILITY RADAR
RECONEXPLOITSIGINT VAPTOSINTDEFENCE
─────────────────────────────── EOF ───────────────────────────────
// SKILLS
$ apt list --installed // View technical expertise
[ Offensive Security ]
Penetration Testing
85%
Active Directory Exploitation
78%
Web Application Testing
80%
Metasploit Framework
82%
Red Teaming (CRTO in progress)
55%
[ Recon & OSINT ]
Nmap / Network Scanning
90%
OSINT Techniques
75%
Burp Suite Pro
83%
Shodan / Maltego
70%
[ Tools & Platforms ]
Kali Linux
92%
Wireshark / Tcpdump
76%
Python Scripting
72%
Bash / Shell Scripting
78%
─────────────────────────────── EOF ───────────────────────────────
// EXPERIENCE
$ git log --format="%h %s" --reverse // Work history
ACTIVE2025 — Present
Trainee Security Analyst
Cynox Security LLP

Hands-on penetration testing across web, network, and AD environments. Conducting authorized VAPT engagements, writing detailed security reports, and collaborating on red team exercises.

VAPTActive DirectoryReporting
ACTIVE2025 — Present
Security Analyst Intern
CyberYaan

Supporting security operations including vulnerability assessment, web application testing, and threat analysis. Assisting senior analysts with penetration test documentation and client communication.

Web App TestingVuln AssessmentSOC
GOVT2025 — Present
Cyber Warrior Intern
GPCSSI — Haryana Police

Working with the Government of Haryana's Cyber Security unit. Exposure to law-enforcement grade cybercrime investigation workflows, digital forensics, and threat intelligence practices.

Digital ForensicsThreat IntelGovt Sec
EDUCATION2023 — Present
B.Tech — Cybersecurity
GNA University

Pursuing a Bachelor of Technology in Cybersecurity. Active participation in CTF competitions, security labs, and research projects on offensive and defensive security topics.

CTFResearchGNA University
─────────────────────────────── EOF ───────────────────────────────
// PROJECTS
$ ls ~/projects/ // Security research & labs
Offensive
Active Directory Lab — Full Compromise Chain

Built a local AD lab (Windows Server 2019 + endpoints) and chained: Kerberoasting → Pass-the-Hash → DCSync → Domain Admin compromise. Documented full attack path and mitigations.

BloodHoundImpacketMimikatzAD
🕸
Web
Web Application Pentest Report (DVWA + Custom)

Full VAPT assessment on DVWA and a custom PHP app. Identified and exploited SQLi, XSS, IDOR, File Upload bypass, Command Injection. Wrote a professional-grade findings report.

SQLMapBurp SuiteOWASP Top 10
🔭
OSINT
OSINT Investigation Framework (Custom Script)

Python-based OSINT automation tool that aggregates data from multiple sources (Shodan, DNS, WHOIS, social scraping) to build a target profile. CLI-driven with JSON output for reporting.

PythonShodan APIOSINTAutomation
📡
Network
Network Traffic Analysis & Anomaly Detection

Captured and analyzed PCAP files from a simulated corporate network. Identified lateral movement, C2 beaconing, data exfiltration patterns using Wireshark + custom Python parsers.

WiresharkPythonZeekPCAP
💉
Exploit Dev
Web Shell Lab — Upload & Persistence Techniques

Researched and tested various web shell upload techniques against hardened environments. Built a test harness to validate WAF bypass methods and document server-side persistence mechanisms.

PHPWAF BypassWeb Shells
🔬
Forensics
Digital Forensics Case Simulation

Simulated a cybercrime investigation for GPCSSI internship — disk imaging, memory forensics with Volatility, timeline analysis, evidence chain-of-custody documentation.

VolatilityAutopsyFTK Imager
─────────────────────────────── EOF ───────────────────────────────
// CERTIFICATIONS
$ gpg --list-keys --keyring credentials // Credentials & education
IN PROGRESS — 2026
🏆
HTB Certified Penetration Testing Specialist
Hack The Box

Hands-on, lab-based certification covering the full pentest lifecycle. Target completion: mid-2026 (3–4 month path).

40%
IN REVIEW — 2026
🔴
Certified Red Team Operator (CRTO)
Zero-Point Security

Advanced red team adversary simulation certification using Cobalt Strike tradecraft. Currently reviewing course material — 37% complete.

37%
COMPLETED
📡
Cyber Warrior Program
GPCSSI — Haryana Police

Government-certified cyber warrior training covering cybercrime investigation, digital forensics, and law-enforcement security protocols.

EDUCATION
🎓
B.Tech — Cybersecurity
GNA University, Punjab

Bachelor of Technology with focus on offensive and defensive cybersecurity. Active in CTF competitions and security research labs.

─────────────────────────────── EOF ───────────────────────────────
// ARSENAL
$ ls ~/tools/ --proficiency
MetasploitOffensive
🔍Burp Suite ProOffensive
💉SQLMapExploit
🗺NmapRecon
🦈WiresharkNetwork
🔬VolatilityForensics
🩸BloodHoundRecon
👑Cobalt StrikeOffensive
📟ResponderExploit
🔭ShodanRecon
📦ScapyNetwork
🔎AutopsyForensics
🕸MaltegoRecon
#️⃣HashcatOffensive
🔑John the RipperOffensive
📡Aircrack-ngNetwork
🌐OSINT FrameworkRecon
🔓Impacket SuiteExploit
💾FTK ImagerForensics
🐉HydraNetwork
20 tools · click any card to expand
─────────────────────────────── EOF ───────────────────────────────
// CTF_WRITEUPS_
$ ls ~/ctf/ --writeups // Capture The Flag solutions
10+Challenges
5Platforms
4Categories
3Hard Solves
WebHard
SQL Injection to Shell — Blind SQLi RCE

Exploited time-based blind SQLi in a login form to dump credentials, then leveraged INTO OUTFILE to write a PHP web shell. Escalated to RCE via Metasploit reverse shell.

#SQLi#RCE#PHP
Buffer OverflowHard
Buffer Overflow 101 — ROP Chain to Shell

Classic stack buffer overflow with NX enabled. Chained ROP gadgets to call system("/bin/sh") using leaked libc base from a format string vulnerability in the same binary.

#x86-64#ROP#ret2libc
ForensicsMedium
PCAP Hunt — Credential Extraction

Extracted credentials from unencrypted HTTP POST in a noisy 12MB PCAP. Flag was base64-encoded inside a custom X-Auth-Token header, found using Wireshark display filters.

#Wireshark#HTTP#Base64
CryptoMedium
XOR Key Reuse — Crib Dragging Attack

Two ciphertexts encrypted with the same XOR key. Used crib dragging with common English phrases to recover the keystream and decrypt both messages. Classic OTP misuse.

#XOR#CribDrag#OTP Reuse
SteganographyEasy
Flag in the Noise — LSB Steganography

Hidden flag encoded in least-significant bits of a PNG image. Extracted using custom Python PIL script after noticing irregular noise patterns in the alpha channel.

#PNG#LSB#Python
AD / ExploitHard
Kerberoasting to Domain Admin

Identified service accounts with SPN, requested TGS tickets, cracked offline with Hashcat. Leveraged cracked credentials to perform Pass-the-Hash and reach Domain Admin via DCSync.

#Kerberoast#AD#DCSync
─────────────────────────────── EOF ───────────────────────────────
// BLOG
$ cat ~/blog/README.md // Security insights & research
Web Security2026-02-20
OWASP Top 10 in Practice: Real-World Exploitation Examples

Walking through each OWASP Top 10 category with real exploitation demos in a lab environment — from SQLi and IDOR to SSRF and Security Misconfiguration.

#OWASP#VAPT#BurpSuite
OSINT2026-02-10
Passive Reconnaissance: Building a Target Profile with Open Sources

How to conduct zero-footprint OSINT — aggregating Shodan data, WHOIS lookups, LinkedIn dorks, Google hacking, and Maltego graphs to build a comprehensive target profile before any active scanning.

#OSINT#Recon#Shodan
Forensics2026-01-28
Memory Forensics with Volatility 3: A Practical Guide

Practical guide to acquiring and analyzing memory dumps using Volatility 3 — process injection, malware artifacts, credential extraction, and timeline reconstruction.

#Volatility#Memory#Forensics
─────────────────────────────── EOF ───────────────────────────────
// TESTIMONIALS
$ cat ~/testimonials/reviews.json // Feedback
★★★★★
"Harjinder's dedication to learning and his methodical approach to AD exploitation is impressive for someone at his stage. He approached our internal CTF with the mindset of a seasoned professional."
MK
Mentor, Cynox Security LLP
Security Lead
★★★★★
"Sharp analytical skills and a genuine passion for cybersecurity. Harjinder consistently went beyond the assigned scope to understand the underlying mechanisms of each vulnerability."
PR
Senior Analyst, CyberYaan
Security Analyst
★★★★☆
"A committed and technically sound intern. His understanding of digital forensics workflows and evidence handling was solid. Looking forward to seeing his progression as he pursues CPTS."
GH
Supervisor, GPCSSI
Haryana Police Cyber Cell
─────────────────────────────── EOF ───────────────────────────────
// CONTACT
$ ssh harjinder@portfolio.local
// IDENTITY
HARJINDER SINGH
Penetration Tester · Security Analyst
Trainee @ Cynox Security LLP · Intern @ CyberYaan & GPCSSI
📍 Ludhiana, Punjab, India
ENCRYPTIONAES-256-GCM
SESSIONACTIVE
UPTIME3+ YRS
STATUSVERIFIED · WHITE HAT
─────────────────────────────── EOF ───────────────────────────────