EclipseAditya

Loading... 0%

About Me
Cybersecurity Philosophy & Approach
Aditya Pandey
Journey into Cybersecurity
Currently pursuing my BTech in Computer Science at Bennett University (2023-2027), I've immersed myself in the world of cybersecurity through hands-on learning and practical experience. My journey spans from web application penetration testing to advanced malware development techniques.
As Head of Research at IEEE Women in Engineering (Aug-Nov 2024) and former Core Member at Async Freelance Club, I've developed leadership skills while pursuing certifications like HTB CPTS, TryHackMe Jr. Penetration Tester, and completing extensive PortSwigger Web Security Academy labs.

What I think about security?

Security is a journey, not a destination. Every vulnerability discovered, every threat mitigated, and every system hardened brings us one step closer to a more secure digital world.

Defense in Depth
My approach is architecting layered defenses, from application-level (RBAC, 2FA) to data-level controls (RLS), to build resilient systems.
Threat-Centric Thinking
Deconstructing adversary TTPs through malware analysis and penetration testing to anticipate and neutralize real-world threats.
Continuous Learning
Relentlessly pursuing advanced knowledge, from the HTB CPTS certification to malware development, to master emerging threats and technologies.
Human-Centric Security
Engineering security that empowers people, from developing interactive training modules to building phishing-resistant user interfaces.

Skills Matrix

Technical Arsenal & Expertise Areas

Python

ACTIVE

Developing custom security tools, AI-driven backends, and network analysis scripts

C/C++

ACTIVE

Low-level programming for malware development, evasion techniques, and shellcoding

JavaScript / TypeScript

ACTIVE

Full-stack applications, interactive UIs (React, Next.js), and Node.js backends

Solidity

ACTIVE

Designing and implementing smart contracts on the Ethereum blockchain for dApps

SQL

ACTIVE

Database design, complex queries, and understanding internals for administration and exploitation

Bash

ACTIVE

Complex CLI tools and automation scripts with TUI (Whiptail) and system integration

Assembly (x86/x64)

ACTIVE

Static malware analysis and crafting custom shellcode

Continuous Learning & Adaptation

The skills section highlights areas I have worked on and gained knowledge in, ranging from beginner to advanced levels. I can also quickly adapt and advance in these skills further if required.

Projects & Case Studies

Real-world cybersecurity implementations and research

Category:
Type:
Pentest Buddy
offensive
Completed
Pentest Buddy

Penetration Testing

Comprehensive AI-enhanced pentesting assistant featuring a Python/Tkinter desktop agent for Kali Linux and Flask backend system with LLM integration, RAG capabilities, and custom MCP protocol for tool orchestration.

Python
Tkinter
Flask
+10
Charak - Blockchain Medical Records
defensive
Completed
Charak - Blockchain Medical Records

Blockchain Security

Decentralized patient-controlled medical records platform leveraging Ethereum smart contracts for secure metadata and access control, IPFS for decentralized file storage, and comprehensive role-based authentication system.

Solidity
Web3.js
IPFS
+9
Birele Ransomware Analysis
offensive
Completed
Birele Ransomware Analysis

Malware Analysis

Comprehensive static and dynamic analysis of Birele Ransomware samples including MPRESS-packed executables and Emotet/Heodo delivery mechanisms, with detailed behavioral mapping to MITRE ATT&CK framework.

Qu1cksc0pe
Any.Run Sandbox
YARA
+9
FlowState Productivity Management System
defensive
Completed
FlowState Productivity Management System

Full-Stack Development

Comprehensive productivity platform featuring a FastAPI web application with task management, Pomodoro timers, data visualization, and an advanced Bash CLI scheduler with system integrations including cron automation, website blocking, and analytical reporting.

FastAPI
SQLAlchemy
Pydantic
+14
Semantic Notes Enhanced - Obsidian Plugin
defensive
Completed
Semantic Notes Enhanced - Obsidian Plugin

AI/NLP

Advanced Obsidian plugin integrating AI-powered semantic search and RAG-based Q&A capabilities for intelligent personal knowledge management and note interaction with configurable embedding models and LLM integration.

TypeScript
Obsidian API
Text Embeddings
+7
Fulcrum Engine - Advanced Phishing Detection
defensive
Completed
Fulcrum Engine - Advanced Phishing Detection

AI/NLP

Advanced AI-powered email security system combining machine learning with psychological intent analysis to detect phishing attempts, featuring ensemble models, TF-IDF vectorization, and real-time threat assessment with 96.77% accuracy.

Python
Flask
Scikit-learn
+10

Want to explore all my projects and contributions?

View All Projects on GitHub

Professional Experience

Career journey in cybersecurity and information security

IEEE Women in Engineering logo

Head of Research

IEEE Women in Engineering

Leadership Role
Aug 2024 - Nov 2024
Greater Noida, India

Led research initiatives and coordinated technical projects at Bennett University's IEEE WIE chapter.

Key Responsibilities

  • Led research initiatives in emerging cybersecurity technologies
  • Coordinated technical workshops and training sessions
  • Mentored junior members in research methodologies
  • Collaborated with faculty on cybersecurity research projects

Technologies & Tools

Python
Research Methodologies
Technical Writing
Project Management

Key Achievements

  • Successfully led multiple research initiatives
  • Improved chapter's research output and quality
  • Developed comprehensive research framework for cybersecurity projects
Async - Official Freelance Club @Bennett University logo

Core Member

Async - Official Freelance Club @Bennett University

Student Organization
Oct 2023 - May 2024
Bennett University

Active core member contributing to freelance community building and skill development programs.

Key Responsibilities

  • Organized workshops on cybersecurity and ethical hacking
  • Mentored students in freelancing and technical skills
  • Contributed to club's technical content and resources
  • Participated in organizing hackathons and coding competitions

Technologies & Tools

Web Development
Cybersecurity Tools
Python
Community Management

Key Achievements

  • Successfully organized multiple technical workshops
  • Helped establish strong cybersecurity focus within the club
  • Mentored 20+ students in technical skills

Ready for New Challenges

I'm always interested in discussing new opportunities in cybersecurity, whether it's penetration testing, threat intelligence, or security research. whether it's penetration testing, threat intelligence, or security research.

Educational Journey

Academic foundation building expertise in cybersecurity and computer science

Research Leadership

Head of Research

Led research initiatives at IEEE WIE chapter

Academic Performance

8.5/10.0 CGPA

Consistent academic excellence in CSE

Community Engagement

Core Member

Active leadership in student organizations

Specialization Focus

Cybersecurity

Specialized track in information security

Bennett University logo
Currently Pursuing

Bachelor of Technology in Computer Science

Cybersecurity & Information Systems

Bennett University
Greater Noida, India
Aug 2023 - May 2027
CGPA: 8.3/10.0

Comprehensive computer science program with specialized focus on cybersecurity, ethical hacking, and information systems security.

Relevant Coursework

1st & 2nd
Programming Fundamentals (C/C++)
Data Structures & Algorithms
Computer Systems Architecture
Discrete Mathematics
Database Management Systems
3rd & 4th
Computer Networks & Security
Operating Systems
Software Engineering
Cybersecurity Fundamentals
Web Technologies & Security
5th & 6th (Current)
Network Security & Cryptography
Ethical Hacking & Penetration Testing
Digital Forensics
Machine Learning for Security

Key Achievements

  • Head of Research - IEEE Women in Engineering (Aug-Nov 2024)
  • Core Member - Async Freelance Club (Oct 2023-May 2024)
  • Active participant in cybersecurity competitions and CTFs
  • Maintained consistent academic performance while pursuing certifications

Academic Projects

  • Blockchain Medical Records System (Full-Stack DApp)
  • AI-Powered Pentesting Assistant
  • Network Security Toolkit in Python
  • FlowState Productivity Management System

Extracurricular

  • IEEE Women in Engineering - Research Leadership
  • Async Freelance Club - Technical Workshops
  • Cybersecurity Study Groups & Peer Learning
  • Open Source Contributions & GitHub Projects
Army Public School (APS) logo
Completed

Higher Secondary Education

Science (PCM + Computer Science)

Army Public School (APS)
Multiple Locations (Army Background)
2012 - 2023
CGPA: 85.2%

Strong foundation in mathematics, physics, and computer science with early exposure to programming and logical thinking.

Relevant Coursework

Class XI & XII
Computer Science (C++ Programming)
Mathematics (Advanced Calculus & Statistics)
Physics (Electronics & Modern Physics)
Chemistry (Physical & Inorganic)
English Communication

Key Achievements

  • Consistent academic performance throughout school years
  • Early interest in computer science and programming
  • Developed foundational understanding of mathematics and physics
  • Participated in school science exhibitions and computer competitions

Academic Projects

  • Basic C++ Programming Projects
  • Computer Science Board Project
  • Mathematics & Physics Problem Solving
  • Early Web Development Experiments

Extracurricular

  • Computer Science Club Participation
  • Inter-school Programming Competitions
  • Science Exhibition Projects
  • Mathematics Olympiad Preparation

Continuous Learning Journey

Committed to staying at the forefront of cybersecurity education through formal academics, industry certifications, and hands-on practical experience.

Certifications

Professional credentials and industry certifications

Active Certifications

Google (Coursera) logo

Google CyberSec

Google Cybersecurity Certificate

Google (Coursera)

Intermediate
Practical
2024

8-course program covering cybersecurity fundamentals, risk management, network security, Linux, SQL, SIEM tools, and Python automation

Key Skills
Python Security Automation
Linux Command Line
SQL
SIEM Tools
IDS
Risk Assessment
Incident Response
TryHackMe logo

THM Jr. PenTest

TryHackMe Jr. Penetration Tester

TryHackMe

Intermediate
Practical
2024

Comprehensive penetration testing path covering web hacking, network security, and privilege escalation

Key Skills
Web Application Hacking
Network Security
Burp Suite
Metasploit
Privilege Escalation
University (Coursera) logo

OS Specialization

Introduction to Operating Systems

University (Coursera)

Intermediate
Academic
2024

4-course specialization covering virtualization, memory management, concurrency, and persistence in operating systems

Key Skills
Operating Systems
Virtualization
Memory Management
Concurrency
File Systems
C Programming
CU Boulder (Coursera) logo

DP & Greedy

Dynamic Programming & Greedy Algorithms

CU Boulder (Coursera)

Advanced
Academic
2024

Advanced algorithm design course covering divide and conquer, dynamic programming, greedy algorithms, and NP-completeness

Key Skills
Algorithm Design
Dynamic Programming
Greedy Algorithms
NP-Completeness
Data Structures
Optimization
Hack The Box logo

HTB Academy

Hack The Box Academy & Labs

Hack The Box

Advanced
Practical
2025

Hands-on cybersecurity training platform with practical penetration testing labs, modules, and real-world attack scenarios

Key Skills
Penetration Testing
Web Application Security
Network Security
Active Directory
Linux Security
Privilege Escalation
Student ID: HTB-9C39244D5C
HTB Labs Profile: View Public Profile

Planned Certifications

HTB CPTS

Hack The Box Certified Penetration Testing Specialist

Hack The Box

Q3 2025

Advanced hands-on penetration testing certification (Currently in progress - more than halfway through)

PortSwigger Labs

PortSwigger Web Security Academy Labs

PortSwigger

Q4 2025

Hands-on web security labs covering SQL injection, XSS, XXE, SSRF, and advanced web vulnerabilities (Ongoing practice)

OSCP

Offensive Security Certified Professional

Offensive Security

Q1 2026

Industry-standard penetration testing certification

Contact Me

For sensitive communications, use GPG encryption to protect your messages

GPG Encryption Guide

Step 0: Download Public Key

Download aditya_pubkey.asc

Step 1: Import Public Key

Import my public key to your GPG keyring

gpg --import aditya_pubkey.asc

Step 2: Encrypt Your Message

Encrypt your message file using my public key

gpg --encrypt --recipient "aditya75pandey@gmail.com" your_secret_msg.txt

Step 3: Send Encrypted File

Send the encrypted .gpg file through any of my contact channels

# Send the your_secret_msg.txt.gpg file through any contact method

Security First

For highly sensitive communications, always use GPG encryption. Regular emails and messages are suitable for general inquiries and collaboration discussions.

GPG Key Fingerprint:

Available in downloaded public key file