Offensive Security
5 toolsEthical Hacking, VAPT, Burp Suite, Metasploit, Nmap, Subdomain Enumeration, Bug Hunting (VDP).
Cybersecurity Analyst · Digital Forensics · Bug Hunter · CTF Player
Cybersecurity Analyst · Digital Forensics · Bug Hunter · CTF Player. Hands-on across offensive security, forensic investigations, OSINT and SOC fundamentals.
6 capability vectors — scroll for details.
Ethical Hacking, VAPT, Burp Suite, Metasploit, Nmap, Subdomain Enumeration, Bug Hunting (VDP).
Windows Forensic Analysis, CDR & IPDR Analysis, Digital Evidence Collection, Data Recovery.
Wireshark, Splunk (Log Analysis), SOC Fundamentals, Dark Web Analysis.
OSINT Fundamentals, Passive/Active Reconnaissance, Threat Intelligence Basics.
Python (Intermediate), Bash Scripting, Linux & Windows Administration, Kali Linux.
Analytical Thinking, Root Cause Analysis, Documentation & Reporting, Team Leadership.
Key wins from CTFs, labs, and continuous learning efforts.
Ranked in the global top 1% across the TryHackMe platform.
Completed 298 hands-on rooms across offensive, defensive, and forensics tracks.
Maintained a 109-day continuous learning and lab streak.
Earned 45 skill badges across core cybersecurity domains.
Formal academic training in computer applications, paired with a continuous stack of cybersecurity certifications and hands-on bootcamps.
Information Technology
A real-time stream of recon, forensics and SOC events from my lab workflow - switch tabs to watch different tools run.
CTF walkthroughs, forensics notes, OSINT and bug-hunting writeups - everything I learn in the field gets documented here.
by Shivam Kumar
2026-04-12
8 min read
Lessons from 298 rooms, a 109-day streak and 45 badges across the TryHackMe platform — what stuck and what I would skip.
by Shivam Kumar
2026-03-02
10 min read
How a hands-on stint at Cyber Cell, Amroha Police inspired a full CDR/IPDR analysis platform with PDF report export.
by Shivam Kumar
2026-02-18
6 min read
Notes from participating as a verified bug hunter (ID: C2026-Q272) in India's biggest live hacking event.
by Shivam Kumar
2026-01-20
9 min read
Walkthrough highlights from a national-level CTF — web exploitation, forensics, cryptography and OSINT.
by Shivam Kumar
2025-12-08
7 min read
Passive vs active reconnaissance, threat intelligence basics, and what investigators actually use day-to-day.
by Shivam Kumar
2025-11-14
5 min read
Building a small but practical recon utility with a 10,000-entry wordlist for pentesting workflows.
by Shivam Kumar
2025-10-22
8 min read
Artifacts, timelines and evidence handling — what stuck after the Windows Forensic Analysis bootcamp.
by Shivam Kumar
2025-09-30
9 min read
Dashboards, search queries and pivoting through alerts — practical patterns for log analysis.
by Shivam Kumar
2025-08-18
10 min read
From VirtualBox to Burp Suite, Metasploit and Nmap — a reproducible recipe for repeatable engagements.
by Shivam Kumar
2025-07-05
6 min read
Filters that matter, capture strategies, and decoding suspicious traffic flows on shared networks.
by Shivam Kumar
2025-06-12
7 min read
Safe methodologies, monitoring services, and common pitfalls when sourcing threat intelligence.
by Shivam Kumar
2025-05-04
5 min read
An 8-hour offensive/defensive sprint — strategy, tooling and the takeaways that stuck.