ANUPAM ADHIKARI

Cybersecurity Specialist

Penetration Testing | Vulnerability Assessment | Security Research

nix-shadow@system:~
$ whoami
Cybersecurity specialist and ethical hacker
$ ls -la skills/
drwxr-xr-x 2 nix-shadow users 4096 May 27 03:38 penetration-testing/
drwxr-xr-x 2 nix-shadow users 4096 May 27 03:38 network-security/
drwxr-xr-x 2 nix-shadow users 4096 May 27 03:38 web-application-security/
drwxr-xr-x 2 nix-shadow users 4096 May 27 03:38 reverse-engineering/
$ ./start_portfolio.sh
Initializing portfolio... Ready for exploration!
$ _
$ cat about.md

About Me

Passionate cybersecurity specialist with expertise in penetration testing, vulnerability assessment, and security research. Committed to securing digital environments and helping organizations strengthen their security posture.

With a background in ethical hacking and defensive security, I bring a comprehensive approach to identifying and mitigating security threats across various platforms and technologies.

Security First
Secure Coding
Bug Hunter
Breach Prevention
$ ls -la skills/

Technical Arsenal

Penetration Testing

  • Network Penetration
  • Web Application Testing
  • Wireless Security
  • Social Engineering

Defensive Security

  • Incident Response
  • Malware Analysis
  • Security Hardening
  • SIEM Management

Programming & Scripting

  • Python
  • Bash Scripting
  • PowerShell
  • C/C++

Tools & Technologies

  • Kali Linux
  • Metasploit
  • Burp Suite
  • Wireshark
$ find ./projects -type f -name "*.md"

Security Projects

Advanced Network Intrusion Detection System

Custom-built network IDS using machine learning to detect anomalous traffic patterns and potential intrusions with minimal false positives.

Python Machine Learning Network Security

Vulnerability Scanner Automation Framework

Automated framework for vulnerability scanning that integrates multiple scanning tools and provides consolidated reports with remediation steps.

Bash Docker Vulnerability Assessment

Phishing Campaign Simulation Tool

Ethical phishing simulation platform for security awareness training, with customizable templates and comprehensive analytics.

JavaScript PHP Social Engineering

Secure Coding Practices Guide

Comprehensive documentation and code examples for implementing secure coding practices across multiple programming languages and frameworks.

Documentation Secure Coding Multi-language
$ ls -la ./certifications/

Security Certifications

Offensive Security Certified Professional (OSCP)

Offensive Security

Issued: Jan 2024
Verify

Certified Ethical Hacker (CEH)

EC-Council

Issued: Sep 2023
Verify

CompTIA Security+

CompTIA

Issued: Mar 2023
Verify

Certified Information Systems Security Professional (CISSP)

(ISC)²

Issued: Jun 2024
Verify
$ cat ./contact_info.txt

Get In Touch

Location

Remote | Available Worldwide

contact.sh
$ ./get_availability.sh
Available for security consulting, pentesting, and training opportunities.
$ ./response_time.sh
Typically responds within 24-48 hours.
$ ./preferred_contact.sh
Email is the preferred method of initial contact.
$ _