Ram

Information Security Analyst | VAPT Specialist | Penetration Tester

Dedicated third-year BTech CSE student with expertise in Cybersecurity, VAPT, and Cryptography, backed by global certifications. Skilled in problem-solving and innovation, seeking a role to enhance organizational security through advanced assessment and defense strategies.

01101001 01101110 01100110 01101111 01110011 01100101 01100011

About Me

I am a passionate Cybersecurity professional with a strong focus on Vulnerability Assessment and Penetration Testing. My expertise extends to cryptography, secure coding practices, and network security.

Currently pursuing my BTech in Computer Science Engineering, I am constantly expanding my knowledge and skills in the rapidly evolving field of information security.

info.ramcontact0099@gmail.com
+91 8867026207
Karnataka, India

My Skills

Security

Cybersecurity
VAPT
Ethical Hacking
Cryptography
Network Security

Programming & Scripting

Bash
PowerShell
Java
Python
C
C++

Tools & Technologies

AWS
MySQL
Oracle SQL
GitHub

Projects

Web-Security-Tool

A Java-based web security tool that performs comprehensive vulnerability assessments, including SQL injection, XSS, CSRF, and more, with a user-friendly interface for efficient web application security testing.

Java Web Security Vulnerability Assessment

TaskBuddy

A Frontend task management application with a user-friendly interface, allowing users to create, organize, and track tasks efficiently.

HTML CSS JavaScript

Encryption-Tool

Adversarial image obfuscation tool that generates ghost images using noise injection, edge distortion, metadata poisoning, and watermarking to prevent unauthorized use in AI training.

Python Computer Vision AI Security

home-page

A steganography tool enabling users to hide and extract secret messages from images, featuring command-line interface, interactive mode, and lightweight encoding/decoding. Available on PyPI.

Python Steganography HTML5 CSS3 JavaScript

Python-projects

Python-based reverse shell for ethical hacking and penetration testing, offering persistence, keylogging, screenshot capture, file transfer, and stealth remote control over compromised systems.

Python Steganography PyPI

EncryptorTool1

A collection of Bash and PowerShell scripts for automating AWS tasks, including CLI setup, S3, EC2, and DynamoDB management, streamlining cloud operations for Linux and Windows users.

PowerShell Bash Python

Experience

Full Stack Developer

Conversia

Apr 2025 – Apr 2026
  • Developed and maintained secure web applications using modern full-stack technologies
  • Performed vulnerability assessments and penetration testing using tools such as Nessus, Acunetix, and OWASP ZAP
  • Identified and remediated security vulnerabilities including XSS, SQL Injection, and authentication flaws
  • Configured and managed AWS IAM roles and policies to strengthen cloud security
  • Collaborated with development teams to implement secure coding practices
  • Prepared detailed security reports and provided remediation recommendations to improve application security

Education

BE in Artificial Inteligence and Machine Learning

VTU Belagavi Karnataka

2022 – 2025

CGPA: 8.1

Class XII

M.D.R.PU SCIENCE COLLEGE Thimmalapur

2022

Percentage: 79%

Class X

M.D.R.S Chornur

2020

Percentage: 81%

Certifications

Certified Ethical Hacker (CEH)

EC-Council

CompTIA Security+

CompTIA

Professional Certificate Program in Cybersecurity - Red Team

IIT Kanpur (Capstone Projects)

Systems and Usable Security (Elite Silver)

NPTEL

Web Application Scanning Certification

Qualys

Networking Basics & Introduction to Packet Tracer

Cisco NetAcad

AWS Certified Cloud Practitioner

Amazon Web Services

API Fundamentals Student Expert

Postman

Achievements

Scopus-indexed Book Chapter

"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025

Book Chapter Submission

"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"

Publications in InfoSec WriteUps and System Weakness

Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness

Top 10 at Hacknovate 5.0

Secured Top 10 (Offline Category) in Hacknovate 5.0, May 2024, with Team API Alchemist at ABES IT, Ghaziabad

Global Top 2% on TryHackMe

Ranked in the Global Top 2% on TryHackMe, showcasing expertise in cybersecurity, ethical hacking, and VAPT through solving advanced, real-world challenges

Trainings & Courses

Forage Cybersecurity Job Simulator

  • MasterCard
  • Telestra
  • Datacom
  • ANZ
  • AIG
  • TCS
  • PWC
  • Commonwealth Bank

AWS Educate - Getting Started with Security

  • Specialized training in AWS IAM and security services

TryHackMe Security Paths

  • Jr Penetration Tester
  • Web Fundamentals

Microsoft Learn Security

  • SC-200: Configure Microsoft Sentinel environment
  • Linux command line and Shell
  • Introduction to GitHub

SimpliLearn Training

  • ISACA CISM
  • ISC2 CCSP
  • CompTIA Network+
  • Introduction to Cyber Security
  • Linux Training

Cisco NetAcad

  • CCNA v7: Introduction to Networks Training

Udemy Security Courses

  • Complete Ethical Hacking Bootcamp
  • Complete Ethical Hacking Course With ParrotOS 2022

EC-Council CodeRed

  • Top 100 Interesting Bugs
  • Getting Started with IoT Security
  • Introduction to Web Forensics
  • Cybersecurity: Cloud Security

Article

Pixel Poisoning: Hacking Generative AI

Pixel Poisoning: Hacking Generative AI

A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.

Read on Medium
Pixel Poisoning: Hacking Generative AI

SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAP

Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.

Read on Medium
Pixel Poisoning: Hacking Generative AI

The Art of Wi-Fi Hacking & Protection with Aircrack-ng

A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.

Read on Medium
View All Posts on Medium

Get In Touch

Email

info.ramcontact0099@gmail.com

Phone

+91 8867026207

LinkedIn

Connect with me