I secure infrastructure by thinking like the adversary.
I'm Sudarshan, an Offensive Security Specialist based in Pune, India. I specialize in executing manual, black-box penetration tests for organizations that require rigorous, real-world security validation.
Automated scanners only catch the low-hanging fruit. Operating with a zero-knowledge approach, I bypass the noise to hunt down the critical vulnerabilities that software misses—complex business logic errors, broken access controls, and structural flaws. My goal isn't just to hand you a list of bugs; I map out the exact paths an attacker would take and provide a clear, actionable roadmap to patch them before they are exploited.
My methodology is backed by a robust security stack, including specialized certifications in forensics (CHFI), cloud architecture (CCSP-AWS), and governance (ISO 27001).
Beyond the Terminal
To stay ahead of the adversary, you have to constantly build and explore. When I'm not securing client environments, I develop open-source offensive tools under the GitHub handle Sud0-x. And when I finally step away from the keyboard, I'm usually unwinding with complex, open-world RPGs.
History
Independent Offensive Security Consultant
Active...Financial & Educational Sectors (Banks, Law Firms, SCADA, Health, NGO, MNC alongside several confidential clients under NDA)
- Executed zero-knowledge, black-box penetration tests against highly regulated financial systems, specifically hunting for deep-seated SQL injections and complex access control bypasses.
- Authored comprehensive, OWASP-aligned security advisories that translated raw technical vulnerabilities into prioritized business risks and strategic remediation roadmaps.
- Partnered directly with client engineering teams to validate patches, ensuring structural security improvements rather than temporary, band-aid fixes.
Independent Vulnerability Researcher
Active...Private Bug Bounty & Vulnerability Disclosure Programs
- Conducted targeted, authorized vulnerability research against private financial and educational platforms during active threat-hunting phases.
- Specialized in uncovering high-impact input validation flaws and logic-based vulnerabilities that automated scanners routinely fail to detect.
- Navigated strict responsible disclosure pipelines, ensuring critical findings were communicated securely and resolved prior to exploitation.
Infrastructure & IoT Security Specialist
Active...Independent Projects & Research
- Engineered and implemented biometric-based IoT access control protocols designed to harden physical security perimeters.
- Conducted comprehensive network topography mapping and vulnerability assessments using Nmap, actively proposing and validating patching strategies.
- Developed and delivered security awareness frameworks aimed at mitigating social engineering and operational security risks at the user level.
Certifications & Expertise
ADVERSARIAL & OFFENSIVE EXPERTISE
CHFI
Computer Hacking Forensic Investigator. Advanced post-exploit analysis and digital forensics.
CRTA / C3SA
Specialized Red Teaming and Security Analysis.
OSINT Specialist
Expert-level reconnaissance and intelligence gathering.
CLOUD & INFRASTRUCTURE DEFENSE
CCSP (AWS)
Certified Cloud Security Professional focused on AWS architecture.
CNSP
Deep-dive Network Security expertise.
CompTIA Security+
Core industry-standard security foundations.
GOVERNANCE & COMPLIANCE (PRO LAYER)
ISO 27001
Expert knowledge in international security management standards.
CAP
Certified Authorization Professional. High-level risk management and authorization.
ISC² CC
Fundamental commitment to professional ethical standards.
What I Do
Black-Box Pentesting
Zero prior knowledge, full attacker simulation. I approach your systems the way a real adversary would — with nothing but a domain or IP and a mission to find a way in. OWASP-aligned reports with prioritised risk ratings and patch guidance.
Web App Security
SQLi, XSS, SSRF, broken auth, IDOR — the full OWASP Top 10 and beyond. I've found critical SQL injection flaws in banking portals that were sitting wide open. Responsible disclosure is always part of the process.
Network Security Audits
Port enumeration, service fingerprinting, firewall bypass analysis, and patching recommendations. I'll tell you exactly which doors are unlocked and what someone could walk through.
Security Reporting
Clear, actionable reports — not 60-page PDFs nobody reads. I write findings with business impact in plain language, so your team actually knows what to fix first and why.
Skills & Toolkit
CORE PROFICIENCIES
Offensive Testing & Exploitation
Reconnaissance & Network Analysis
Strategic & Red Teaming
Infrastructure & Tooling
ADVERSARIAL TOOLING & EXPLOITATION
TARGET ENVIRONMENTS & ATTACK INFRASTRUCTURE
SECURITY FRAMEWORKS & METHODOLOGIES
- OWASP Testing Guide (WSTG): Comprehensive Web App Security.
- MITRE ATT&CK Framework: Mapping real-world adversary tactics.
- NIST & ISO 27001: Governance, risk, and compliance alignment.
- Responsible Disclosure Pipelines: Ethical vulnerability reporting.
Open Source Projects
Sud0AI
AI-assisted pentesting tool with an automated exploitation engine. Combines LLM reasoning with traditional attack techniques to speed up manual testing workflows.
Sud0Recon
Modular recon and vulnerability scanner with async scan support, real detection capabilities, a plugin system, and coloured CLI output built for pentesters and bug bounty hunters.
Sud0Hunt
Automated pentesting and bug bounty recon toolkit. Designed to cut down the time spent on initial reconnaissance without sacrificing thoroughness.
Sud0NetScanner
Multi-threaded network scanner. Fast, configurable, and built for real assessment work rather than just demos.
FortiForge
Automated infrastructure hardening and security baseline auditing framework designed for enterprise environments.
MetaPurge-X
Advanced metadata stripping and privacy-centric file sanitization utility to prevent data leakage in secure workflows.