building tools. breaking protocols. understanding systems.
whoami
───────────────────────────────────────────────────
Reeshu Singh
Cyber Security Intern @ IIT Madras
Focus : Network Security · Offensive Security
Based : Vadodara, India
- Interning at IIT Madras — C2 framework development, firmware attack research, offensive security tooling
- Deepening expertise in BGP security and network protocol exploitation
- Building real-world offensive tools and lab environments
| Project | What it does | Stack |
|---|---|---|
| BGP Route Hijacking Lab | Replicates the 2008 Pakistan Telecom attack — 3-AS lab simulating real BGP subprefix hijacking with RPKI mitigation | FRRouting · Ubuntu · Wireshark |
| ESP32 Wireless Threat Monitor | Passive 802.11 capture device detecting deauth floods, rogue APs and evil twin attacks in real time | ESP32 · Arduino C · mbedTLS |
| MITM Attack Lab | Full MITM chain — WPA2 handshake capture, SSL-strip, session interception | Bettercap · Wireshark · Kali |
Also work with: Wireshark · Nmap · Metasploit · Burp Suite · Bettercap · Aircrack-ng · FRRouting · Kali Linux · Tails OS · Tor · tcpdump
[✓] BGP route hijacking lab — 3-AS simulation
[✓] Hardware wireless threat monitor — ESP32
[✓] MITM attack simulation lab
[✓] C2 framework contribution @ IIT Madras
[✓] Firmware attack research @ IIT Madras
[ ] eJPT certification
[ ] HackTheBox — active machines
[ ] Security blog / writeups
[ ] OSCP (long term)
always learning. always building.

