Skip to content
View karthikparambil's full-sized avatar
☺️
☺️

Block or report karthikparambil

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
karthikparambil/README.md

👋 Hey, I'm Karthik

Cybersecurity Researcher | Pentester | CTF Player

LinkedIn Email Portfolio

About Me

Your Image Badge
I’m passionate about exploring the depths of cybersecurity, uncovering vulnerabilities, and building secure systems.
My work spans ethical hacking, network security, and offensive security with a current focus on Web Application Security and related fields.

  • Role: Cybersecurity Researcher & Pentester
  • Focus Areas: Network Security and Web security
  • CTF Player: Actively participating in Capture The Flag competitions
  • Expertise: Most tools in ethical hacking (Kali Linux, Burp Suite, Metasploit, Nmap, Wireshark, etc.)
  • Learning: Advanced web exploitation, Active Directory, vulnerability research, and automation for security testing
  • Sharing Knowledge: Documenting tools, techniques, and methodologies on GitHub

Karthik's Profile

Technical Skills

  • Offensive Security: Penetration Testing, Red Team Operations, Exploit Development

  • Web Security: OWASP Top 10, API Security, Bug Hunting

  • Network Security: Vulnerability Assessment, Protocol Analysis

  • Forensics: File & Memory Analysis, Steganography, Incident Response

Tools & Frameworks

Kali Linux Nmap Hydra Burp Suite Metasploit Wireshark John the Ripper Gobuster Nikto SQLmap Hashcat Maltego Aircrack-ng Aircrack-ng

Programming/Scripting

Logo
python bash c++ html html js

Projects & Contributions

  • CTF Challenges - Forensics, Web Exploitation, Cryptography
  • Machines - Custom vulnerable Machines for pentesting
  • Security Tools - Scripts & utilities for automating recon and exploitation
  • Open-Source Contributions - Sharing knowledge and resources for the security community

💡 “Security is not a product, but a process.” - Bruce Schneier

Pinned Loading

  1. Mission-Escape Mission-Escape Public

    A custom-built prison break themed vulnerable virtual machine designed for cybersecurity training

    3

  2. Mission-Space Mission-Space Public

    A custom-built vulnerable virtual machine designed for cybersecurity training

    2

  3. pwnkit pwnkit Public

    Collection of automation scripts designed for pentesting and cybersecurity tasks

    Shell 2

  4. lxd2root lxd2root Public

    Privilege Escalation Exploit

    Shell 2

  5. scanix scanix Public

    Automated reconnaissance suite

    Shell 2

  6. gfinder gfinder Public

    Gfinder is a powerful search tool to find code, files, and hidden secrets instantly using powerful filters and clear visual results.

    Python 3