HELLO, I'M RAKESH RANJAN PRADHAN
SECURITY
ENGINEER
Specializing in Ethical Hacking, VAPT, and Penetration Testing to fortify digital infrastructures against evolving threats.
IT'S NOT JUST CODE.
IT'S PROTECTION.
I am a dedicated Security Engineer with a passion for breaking things to make them stronger. My philosophy is simple: security is not a product, but a process.
With a background in web development and a deep focus on cybersecurity, I bridge the gap between building functional applications and securing them against malicious actors. I specialize in identifying vulnerabilities before they can be exploited.
CAPABILITIES
OFFENSIVE
SECURITY
Deploying advanced methodologies to identify, analyze, and mitigate security risks before they become threats.
VAPT
Vulnerability Assessment & Penetration Testing. Systematic review of security weaknesses in an information system.
RED TEAMING
Adversary simulation. Multi-layered attack simulations to measure how well your people, networks, and applications can withstand an attack.
WEB & API SECURITY
In-depth analysis of web applications and APIs (OWASP Top 10) to prevent data breaches and service disruption.
NETWORK SECURITY
Securing internal and external network perimeters through rigorous testing and configuration auditing.
THE ARSENAL
DEPLOYMENTS
RECENT
OPERATIONS
SOCIAL-ENGINEER TOOLKIT
Advanced phishing framework for cloning corporate portals and harvesting credentials to test employee awareness.
WIFI-PINEAPPLE CLONE
Rogue Access Point implementation to capture WPA handshakes and perform Man-in-the-Middle attacks.
RANSOMWARE SIMULATOR
Controlled crypto-locker simulation to test EDR response capabilities and backup recovery procedures.
PORTABLE PENTEST RIG
Raspberry Pi 3 based tactical hacking station configured for automated onsite assessments and data exfiltration.
ESP8266 DEAUTHER
Custom firmware implementation for testing WiFi network resilience against deauthentication and beacon flood attacks.
GAIN: 14dB
TX: ACTIVE
SDR SIGNAL REPLAY
Radio frequency analysis and GPS signal spoofing using HackRF One for testing location-based services.