// WHOAMI

I secure infrastructure by thinking like the adversary.

I'm Sudarshan, an Offensive Security Specialist based in Pune, India. I specialize in executing manual, black-box penetration tests for organizations that require rigorous, real-world security validation.

Automated scanners only catch the low-hanging fruit. Operating with a zero-knowledge approach, I bypass the noise to hunt down the critical vulnerabilities that software misses—complex business logic errors, broken access controls, and structural flaws. My goal isn't just to hand you a list of bugs; I map out the exact paths an attacker would take and provide a clear, actionable roadmap to patch them before they are exploited.

My methodology is backed by a robust security stack, including specialized certifications in forensics (CHFI), cloud architecture (CCSP-AWS), and governance (ISO 27001).

Beyond the Terminal

To stay ahead of the adversary, you have to constantly build and explore. When I'm not securing client environments, I develop open-source offensive tools under the GitHub handle Sud0-x. And when I finally step away from the keyboard, I'm usually unwinding with complex, open-world RPGs.

100+
Pentests
12+
Certifications
300+
OSS Tools
5y+
Experience
// PROFESSIONAL EXPERIENCE

History

Independent Offensive Security Consultant

Active...

Financial & Educational Sectors (Banks, Law Firms, SCADA, Health, NGO, MNC alongside several confidential clients under NDA)

  • Executed zero-knowledge, black-box penetration tests against highly regulated financial systems, specifically hunting for deep-seated SQL injections and complex access control bypasses.
  • Authored comprehensive, OWASP-aligned security advisories that translated raw technical vulnerabilities into prioritized business risks and strategic remediation roadmaps.
  • Partnered directly with client engineering teams to validate patches, ensuring structural security improvements rather than temporary, band-aid fixes.
Black-Box Methodologies Web App Exploitation Burp Suite SQLMap

Independent Vulnerability Researcher

Active...

Private Bug Bounty & Vulnerability Disclosure Programs

  • Conducted targeted, authorized vulnerability research against private financial and educational platforms during active threat-hunting phases.
  • Specialized in uncovering high-impact input validation flaws and logic-based vulnerabilities that automated scanners routinely fail to detect.
  • Navigated strict responsible disclosure pipelines, ensuring critical findings were communicated securely and resolved prior to exploitation.
Advanced Vulnerability Research OWASP Top 10 Threat Modeling Responsible Disclosure

Infrastructure & IoT Security Specialist

Active...

Independent Projects & Research

  • Engineered and implemented biometric-based IoT access control protocols designed to harden physical security perimeters.
  • Conducted comprehensive network topography mapping and vulnerability assessments using Nmap, actively proposing and validating patching strategies.
  • Developed and delivered security awareness frameworks aimed at mitigating social engineering and operational security risks at the user level.
IoT Infrastructure Defense Network Mapping (Nmap) Physical Access Control Risk Mitigation
// ADVANCED QUALIFICATIONS

Certifications & Expertise

ADVERSARIAL & OFFENSIVE EXPERTISE

CHFI

Computer Hacking Forensic Investigator. Advanced post-exploit analysis and digital forensics.

CRTA / C3SA

Specialized Red Teaming and Security Analysis.

OSINT Specialist

Expert-level reconnaissance and intelligence gathering.

CLOUD & INFRASTRUCTURE DEFENSE

CCSP (AWS)

Certified Cloud Security Professional focused on AWS architecture.

CNSP

Deep-dive Network Security expertise.

CompTIA Security+

Core industry-standard security foundations.

GOVERNANCE & COMPLIANCE (PRO LAYER)

ISO 27001

Expert knowledge in international security management standards.

CAP

Certified Authorization Professional. High-level risk management and authorization.

ISC² CC

Fundamental commitment to professional ethical standards.

// CAPABILITIES

What I Do

Black-Box Pentesting

Zero prior knowledge, full attacker simulation. I approach your systems the way a real adversary would — with nothing but a domain or IP and a mission to find a way in. OWASP-aligned reports with prioritised risk ratings and patch guidance.

Web App Security

SQLi, XSS, SSRF, broken auth, IDOR — the full OWASP Top 10 and beyond. I've found critical SQL injection flaws in banking portals that were sitting wide open. Responsible disclosure is always part of the process.

Network Security Audits

Port enumeration, service fingerprinting, firewall bypass analysis, and patching recommendations. I'll tell you exactly which doors are unlocked and what someone could walk through.

Security Reporting

Clear, actionable reports — not 60-page PDFs nobody reads. I write findings with business impact in plain language, so your team actually knows what to fix first and why.

// TECHNICAL ARSENAL

Skills & Toolkit

CORE PROFICIENCIES

Offensive Testing & Exploitation

Burp Suite / Web App Testing 94%
Business Logic & API Exploitation 89%
SQL Injection & Input Validation 88%

Reconnaissance & Network Analysis

OSINT & Threat Reconnaissance 93%
Nmap / Network Topography 91%
Wireshark / Packet Analysis 86%

Strategic & Red Teaming

Threat Modeling & Remediation Advisory 95%
Red Team Operations & C2 87%
Active Directory Identity Exploitation 85%
IoT & Perimeter Access Bypassing 83%

Infrastructure & Tooling

Linux (Kali / Arch / Ubuntu) 92%
Cloud Security (AWS) 87%
Python / Bash Scripting 84%

ADVERSARIAL TOOLING & EXPLOITATION

Web Exploitation
Burp Suite ProfessionalSQLMap
Network Reconnaissance
NmapMasscan
Traffic Analysis
Wiresharktcpdump
OSINT & Threat Mapping
MaltegoBloodHound

TARGET ENVIRONMENTS & ATTACK INFRASTRUCTURE

Enterprise Infrastructure
Windows Active DirectoryRHEL
Attack Environments
Custom Kali LinuxArch LinuxUbuntu Server
Cloud Environments
AWS InfrastructureIAM Roles

SECURITY FRAMEWORKS & METHODOLOGIES

  • OWASP Testing Guide (WSTG): Comprehensive Web App Security.
  • MITRE ATT&CK Framework: Mapping real-world adversary tactics.
  • NIST & ISO 27001: Governance, risk, and compliance alignment.
  • Responsible Disclosure Pipelines: Ethical vulnerability reporting.
// GITHUB.COM/SUD0-X

Open Source Projects