Skip to content
View vettrivel007's full-sized avatar
๐Ÿ˜‡
๐Ÿ˜‡

Block or report vettrivel007

Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
vettrivel007/README.md

๐Ÿ‘‹ Greetings, Cyber Guardians!

Iโ€™m VETTRIVEL U, a passionate Offensive Security Expert hailing from Cuddalore, Tamil Nadu, India ๐Ÿ‡ฎ๐Ÿ‡ณ.

I'm specialized in Vulnerability Assessment & Penetration Testing (VAPT), Red Teaming, and Offensive Security Operations โ€” with a proven track record of breaching systems to secure them.

Iโ€™ve earned multiple Hall of Fame recognitions from MNCs for responsibly disclosing critical vulnerabilities. From gaining root access to high-level systems to pwning servers, Iโ€™ve had the thrill of ethically exploiting and helping secure both Indian and US government infrastructures.

Along the way, Iโ€™ve bagged exclusive swags and rewards, and Iโ€™m proudly listed as a Top Voice in Information Security on LinkedIn.

As a freelancer, I collaborate with companies to work on outsourced security projects โ€” and have been paid by top-tier organizations for my findings.

I also love giving back to the community: conducting classes, webinars, and mentorship sessions for juniors and aspiring bug bounty hunters.

I recently qualified for the finals of a national-level Hackathon x CTF, proving my ability to think under pressure and hack smart.

Youโ€™ll often find me sharing deep dives and writeups on Medium, covering everything from 0-day findings to beginner tips.


๐Ÿ† Hall of Fame & Achievements

  1. Flipkart โ€“ Positioned First Place in Hall of Fame
  2. Swags from BugCrowd โ€“ Earned StormTech Backpack & Beanie
  3. Mina Protocol โ€“ Identified vulnerabilities in Blockchain-Based Web Application
  4. HACKEN โ€“ Discovered Critical vulnerabilities in Web & Apps
  5. Swaggle โ€“ Reported 3+ vulnerabilities (2 High, 1 Low)
  6. U.S. Small Business Administration โ€“ Reported 2 vulnerabilities (1 Medium, 1 Low)
  7. Westpac Banking Corporation โ€“ Identified High & Medium severity vulnerabilities in Banking Infrastructure
  8. Zoopla โ€“ Discovered vulnerabilities in Web Application
  9. Roobet โ€“ Reported 1 High severity vulnerability

๐Ÿ›  Skills & Tools

Core Cybersecurity Skills:

  • Vulnerability Assessment & Penetration Testing (VAPT)
  • Expertise in Web, Network, API, and LLM AI security, addressing OWASP Top 10 vulnerabilities
  • Red Team Engagements & Threat Emulation
  • Bug Bounty Hunting - Web, API, Network
  • Post-Exploitation & Privilege Escalation (Linux/Windows)
  • Network Exploitation & Lateral Movement
  • Offensive Security Operations
  • Static/Dynamic Application Security Testing (SAST/DAST)
  • CTF Strategy & Real-World Simulations

Tools & Frameworks Mastery:

  • Web & Network Pentesting: Burp Suite Pro, Nmap, Metasploit, Postman, OWASP ZAP, Hydra, Nessus, OpenVAS, BeEF
  • Exploitation & Recon: SQLmap, XSS Hunter, XSStrike, Commix, FUFF
  • Enumeration & OSINT: Amass, theHarvester, Subfinder, Assetfinder
  • Directory & Service Enumeration: Dirb, Gobuster, Nikto, WhatWeb, Wappalyzer CLI, Aircrack-ng
  • Threat Intelligence: Shodan, Censys, Google Dorking, Maltego
  • Active Directory & Post-Exploitation: BloodHound, Empire, CrackMapExec, Responder, Impacket
  • Cloud Security: Steampipe (Cloud IAM Audit), CloudSploit, ScoutSuite

๐Ÿ› ๏ธ Scripting & Automation:

  • Bash Scripting (Pentest automation, enumeration scripts, payloads)
  • Python (Custom tools, exploit development, automation)
  • Tool Wrapping & Chaining
  • Developed internal scripts to speed up assessments & scanning

Knowledge & Methodologies:

  • OWASP Top 10 (Web & API)
  • MITRE ATT&CK Framework
  • NIST Methodologies
  • Secure Code Review
  • Common CVEs and Exploitation Tactics
  • Deep understanding of Linux & Windows Internals (for post-exploitation)

๐ŸŽ“ Certifications

  • โœ… eJPT - Jr. Penetration Tester (INE)
  • โœ… CEH Essentials (EC-Council)
  • โœ… API Security Fundamentals (APISec University)
  • โœ… CC (ISC2)
  • โœ… EHPT+ (Udemy)

๐Ÿ“ซ Connect With Me


๐Ÿš€ Always learning & pushing boundaries in cybersecurity! ๐Ÿ›ก

Popular repositories Loading

  1. RepoVulnScan RepoVulnScan Public

    RepoVulnScan is a security tool designed to scan GitHub repositories for known vulnerabilities in dependency files. It checks package versions against vulnerability databases using OSV API and helpโ€ฆ

    Go 2 2

  2. DDoS-Wave DDoS-Wave Public

    DDoS-Wave is a tool designed for educational and ethical use. It simulates high-traffic scenarios by sending TCP packets with randomized source IPs and ports to a specified target, helping users unโ€ฆ

    Python 2

  3. Internet-CalC Internet-CalC Public

    Well refined and Compactable IP Calculator for IP RANGE, CIDR, HEX, BINARY, DEC

    Python 1

  4. Meta-extracter Meta-extracter Public

    Extract metadata (including EXIF data) from image files such as PNG, JPG, and JPEG. EXIF metadata including GPS coordinates, camera model, exposure settings, and more.

    Python 1

  5. ISCP-CTF ISCP-CTF Public

    Real-time PII Defense

    Python 1 1

  6. CVE-Disclosures CVE-Disclosures Public

    A repository documenting security vulnerabilities discovered in Free and Open Source Software (FOSS) by VETTRIVEL U

    1