Cybersecurity Background

Security Researcher & Ethical Hacker

Building secure systems and exploring the boundaries of cybersecurity.

I'm a passionate security researcher focused on network security, IoT security, and machine learning for cybersecurity. I create projects that combine deep technical knowledge with security best practices.

Interested in security research, vulnerability assessment, or secure protocol design? Let's talk.

Security Projects & Research

A collection of my security research, penetration testing tools, and secure system designs.

ARP Spoofing Detection in SDN Internship Research

Machine Learning based MITM attack detection in Software-Defined Networks

Research project at Thapar Institute developing an ensemble-based anomaly detection system using Isolation Forest and Artificial Neural Networks to identify and mitigate ARP spoofing attacks in SDN environments.

Simulated MITM attacks via ARP poisoning to understand attack vectors and developed defensive cybersecurity controls within modern SDN architectures.

Python Machine Learning SDN Security Scikit-learn

Secure IoT Protocol Patent Filed

Patent-published secure asset tracking system for constrained IoT devices

Designed and built a secure asset tracking system addressing IoT security challenges in constrained devices. Architected a custom authentication protocol to prevent node spoofing and ensure data integrity.

Resulted in a patent filed (202511063250) with the Indian Patent Office. The system demonstrates secure communication in low-power, wide-area networks.

C++ Arduino LoRa IoT Security Cryptography

Network Vulnerability Scanner open source

Multi-threaded automated reconnaissance and vulnerability assessment tool

Engineered a multi-threaded Python tool that automates network reconnaissance and vulnerability scanning. Integrated Nmap for comprehensive port scanning, service discovery, and OS fingerprinting.

Streamlines security assessments by providing structured data outputs for further analysis and reporting. Ideal for penetration testing and network security audits.

Python Nmap Multi-threading Penetration Testing Vulnerability

Hardware Security & Threat Modeling open source

HID attack simulation and encrypted C2 channel for red team exercises

Researched and simulated HID-based attacks to model Advanced Persistent Threat (APT) initial access techniques. Implemented an encrypted C2 channel using AES to demonstrate payload obfuscation.

This project explores hardware security vulnerabilities and demonstrates red team techniques for educational purposes in controlled environments.

C Raspberry Pi Pico AES HID Attacks Threat Modeling

Contact

Feel free to reach out for security research collaboration, vulnerability disclosure, or technical discussions!

Email: security@example.com

GitHub: github.com/MrP-cpu

PGP Key: Available upon request for secure communication

Signal: Secure messaging available for sensitive discussions

I'm particularly interested in discussing IoT security, network defense mechanisms, and vulnerability research.