Im Karthikeyan

|

Security enthusiast specialized in Vulnerability Assessment, Penetration Testing, and SOC operations. Breaking systems to make them stronger.

PSYCLOX

Security
Engineer

Move Your Cursor
About Pic 1
About Pic 2
About Pic 3
About Pic 4
About Pic 5
About Pic 6
About Pic 7
About Pic 8
About Pic 9
About Pic 10
About Pic 11
About Pic 12
About Pic 13
About Pic 14
About Pic 1
About Pic 2
About Pic 3
About Pic 4
About Pic 5
About Pic 6
About Pic 7
About Pic 8
About Pic 9
About Pic 10
About Pic 11
About Pic 12
About Pic 13
About Pic 14

cybersecurity professional bridging offensive and defensive security to eliminate critical vulnerabilities, respond to threats in record time, and build resilient infrastructure

My Skills

Offensive Security

  • Web Application VAPT
  • Network Infrastructure Testing
  • Manual Exploitation & POCs
  • LLM & GenAI Security Testing
  • Cloud Security Assessments
  • API Security Testing

Technical Ops

  • Secure Code Review & Auditing
  • AI-Driven Threat Detection
  • SOC & SIEM Monitoring
  • Threat Modeling & Analysis
  • Python Security Automation
  • Vulnerability Management

Deployment Tools

Burp Pro
Nessus
Metasploit
BeEF
Active Dir
PentestGPT
Kali
Wireshark
Hashcat
ZAP
Nmap
Hydra
Splunk
Wazuh
Snort
AlienVault

Featured Projects

Security tools and real-world assessments

Encrypt Anything

Deployed
init encryption_module loading AES-256... [OK] derive_key(pbkdf2)... [OK]

Military-grade text encryption tool. Secures sensitive data using client-side AES-256 and PBKDF2 key derivation.

JavaScript Cryptography Chrome Ext

VAPT Assess

Classified
nmap -sV -p- target_ip scanning ports... [DONE] found critical vuln: CVE-2023-XXXX

Comprehensive vulnerability assessment and penetration testing. Identified critical risks and provided remediation strategies.

Network Sec Web App PenTest Report Writing

ReconMate

Deployed
> ./reconmate.py -t target [+] Enumerating Subdomains... [+] Analyzing DNS Records...

Professional-grade OSINT automation tool. Streamlines reconnaissance with multi-threaded subdomain enumeration and port scanning.

Python OSINT Automation

Netshark

Active
> ./netshark.py --monitor wlan0 [+] Capturing packets... [!] ANOMALY DETECTED: 192.168.1.5

Network Traffic Anomaly Detector. Analyzes PCAP files and captures live traffic to identify suspicious patterns and potential intrusions.

Python PCAP Network Sec

SQLister

Deployed
> ./sqlister.py -u http://target.com [+] Testing parameter 'id'... [!] VULNERABLE: Union Based SQLi

Advanced SQL injection detection and exploitation tool. Automates the discovery of SQLi vulnerabilities with intelligent payload generation.

Python SQLi Automation

Operation Logs

Cybervault

CyberVault Innovations

Cyber Security Analyst
ACTIVE Oct 2025 — Present
  • Conducting vulnerability assessments and penetration testing on client infrastructure
  • Monitoring and analyzing security events in SOC environment
  • Bridging offensive and defensive security operations
  • Leveraging AI-driven tools for threat detection and analysis
  • Collaborating with teams to implement security remediations
VAPTSOCPurple TeamAI Analysis
HackerOne

HackerOne

Bug Bounty Hunter
ACTIVE Since June 2025
  • Identifying and reporting security vulnerabilities in web applications
  • Participating in bug bounty programs to secure digital assets
  • Analyzing business logic errors and critical security flaws
  • Documenting proof-of-concept exploits for remediation
Web SecurityBug BountyPenetration Testing

Operative Roadmap

CEH Practical Logo

Certified Ethical Hacker (Practical)

Rigorous practical exam validating real-world ethical hacking skills.

Verified
TCM Security Logo

Practical Ethical Hacker

Hands-on penetration testing certification covering network and AD attacks.

Verified
TryHackMe Logo

Offensive Pentesting

Advanced exploitation techniques and red teaming methodologies.

Verified
CAPIJ Logo

Certified API Pentester

Specialized certification in identifying and exploiting API vulnerabilities.

Verified
OSCP Logo

OSCP

Offensive Security Certified Professional. The gold standard in pentesting.

Target Locked // Prep

Operational Milestones

35+
VULNERABILITIES
10+
AUDITS
73+
CTFS CLEARED

Get In Touch

Have a project in mind? Let's talk security.