Building secure systems and exploring the boundaries of cybersecurity.
I'm a passionate security researcher focused on network security, IoT security, and machine learning for cybersecurity. I create projects that combine deep technical knowledge with security best practices.
Interested in security research, vulnerability assessment, or secure protocol design? Let's talk.
A collection of my security research, penetration testing tools, and secure system designs.
Machine Learning based MITM attack detection in Software-Defined Networks
Research project at Thapar Institute developing an ensemble-based anomaly detection system using Isolation Forest and Artificial Neural Networks to identify and mitigate ARP spoofing attacks in SDN environments.
Simulated MITM attacks via ARP poisoning to understand attack vectors and developed defensive cybersecurity controls within modern SDN architectures.
Patent-published secure asset tracking system for constrained IoT devices
Designed and built a secure asset tracking system addressing IoT security challenges in constrained devices. Architected a custom authentication protocol to prevent node spoofing and ensure data integrity.
Resulted in a patent filed (202511063250) with the Indian Patent Office. The system demonstrates secure communication in low-power, wide-area networks.
Multi-threaded automated reconnaissance and vulnerability assessment tool
Engineered a multi-threaded Python tool that automates network reconnaissance and vulnerability scanning. Integrated Nmap for comprehensive port scanning, service discovery, and OS fingerprinting.
Streamlines security assessments by providing structured data outputs for further analysis and reporting. Ideal for penetration testing and network security audits.
HID attack simulation and encrypted C2 channel for red team exercises
Researched and simulated HID-based attacks to model Advanced Persistent Threat (APT) initial access techniques. Implemented an encrypted C2 channel using AES to demonstrate payload obfuscation.
This project explores hardware security vulnerabilities and demonstrates red team techniques for educational purposes in controlled environments.
Feel free to reach out for security research collaboration, vulnerability disclosure, or technical discussions!
Email: security@example.com
GitHub: github.com/MrP-cpu
PGP Key: Available upon request for secure communication
Signal: Secure messaging available for sensitive discussions
I'm particularly interested in discussing IoT security, network defense mechanisms, and vulnerability research.