Cybersecurity Analyst | Penetration Tester | CTF Player
Welcome to my portfolio! I am passionate about cybersecurity, with expertise in vulnerability assessment, penetration testing, and forensics. Explore my projects, certifications, and skills below.
- π§ Email: [email protected]
- π LinkedIn: linkedin.com/in/prashantmoroliya
- π» GitHub: github.com/prashantmoroliya
I am a Postgraduate in Cybersecurity and Forensics from CDAC Thiruvananthapuram, with a B.Tech in Computer Science. My professional journey includes hands-on experience in SIEM, Android Penetration Testing, and Reverse Engineering.
I have led 35+ CTF challenges and successfully completed internships where I designed solutions for complex cybersecurity scenarios.
- Python, Java, C++, C, JavaScript
- Burp Suite, NMAP, WireShark, Metasploit, Acunetix, T-Pot, Drozer
- Web Application Security (OWASP Top 10)
- Network Security: Firewalls, IDS/IPS, VPNs
- Cryptography: AES, RSA, PKI
- Digital Forensics
- Junior Penetration Testing
- Red Teaming
- Offensive Penetration Testing
- SOC Levels 1 & 2
- TryHackMe Cybersecurity 101
- Full Stack Java Development
Conducted a full vulnerability assessment on Metasploitable 2, demonstrating exploitation techniques and reporting.
Deployed a honeypot on AWS to detect malicious activity and study attacker behavior.
Analyzed Tor network traffic using Tails OS to explore de-anonymization methods.
Designed an IoT-based home automation system using Arduino and Bluetooth.
Check out more here.
- Conducted vulnerability assessments on enterprise networks.
- Collaborated on drafting cybersecurity policies.
- Participated in incident response simulations.
- CTF Team Name: Vulnex
- Challenges Played: 35+
- Specialization: OSINT, Web Exploitation, Android Vulnerabilities, Reverse Engineering.
- π§ Email: [email protected]
- π LinkedIn: linkedin.com/in/prashantmoroliya
- π» GitHub: github.com/prashantmoroliya
- π± Phone: +91 - 8770866804
I believe cybersecurity isn't just about defenseβit's about understanding the mindset of the attacker to build resilient systems.
"Every vulnerability is an opportunity to improve security."