ABOUT
Cybersecurity Enthusiast and Penetration Tester
I am a dedicated Cybersecurity Enthusiast and Penetration Tester with practical experience in Web and Network security, vulnerability assessment and threat intelligence. Currently pursuing a B.Sc. in Computer Science and Engineering at Green University of Bangladesh. I have developed a strong foundation in programming, system security and modern development practices. My hands-on experience includes working with industry-standard tools such as Burp Suite, Nmap, Metasploit, Wireshark and Nessus to identify, analyze, and mitigate security vulnerabilities across different environments.
More About Me
USED TOOLS
Nmap
Nmap is a powerful network scanning and security auditing tool. It's used to discover devices, open ports, and running services on a network.
Metasploit
Metasploit a penetration-testing framework for running exploits and payloads. Use only on systems you own or have permission to test.
Burpsuite
Burp Suite an integrated web-application security testing toolkit (proxy, scanner, repeater) used to intercept, analyze, and exploit HTTP/S traffic
Nessus
Nessus a vulnerability scanner that detects missing patches, misconfigurations, and known CVEs use only on systems you own or are authorized to test.
Hydra
Hydra a fast parallelized login-brute-force tool for testing password strength against services (SSH, FTP, HTTP forms, etc.). Use only on systems you own or are authorized to test.
Wireshark
Wireshark a GUI packet analyzer that captures and inspects network traffic (packets) for troubleshooting, protocol analysis, and forensic investigation.
Hashcat
Hashcat: a high-performance password-recovery and cracking tool that uses CPU/GPU acceleration to brute-force or use wordlists against hashed passwords (MD5, bcrypt, NTLM, etc.).
Autopsy
Autopsy: a graphical digital-forensics platform for analyzing disk images, recovering files, and investigating timestamps/artifacts during incident response use only on systems/images you have authorization to examine.
Aircrack
Aircrack-ng a suite for auditing WiFi: capture packets, extract handshakes, and crack WEP/WPA/WPA2 PSKs using wordlists/GPU acceleration.
Setoolkit
SET an open-source framework for automating social-engineering attacks (phishing, credential harvesting, payload delivery) to test human vectors.
SERVICES PROVIDED
Web Development
Building responsive, modern websites and web applications using the latest technologies and best practices for optimal user experience.
PenTesting
Pentesting: PenTesting is a simulated cyberattack on your system or network to identify and exploit any vulnerabilities. Pentesting can help you assess your security posture,and protect your data and assets from malicious hackers.
Web VAPT
Web VAPT: Web VAPT is a type of VAPT that focuses on testing the security of your web applications, such as websites, APIs, or mobile apps. Web VAPT can help you discover and exploit any web vulnerabilities, such as SQL injection, cross-site scripting, broken authentication, or insecure file uploads.
Network VAPT
Network VAPT: Network VAPT is a type of VAPT that focuses on testing the security of your network infrastructure, such as routers, switches, firewalls, servers, and wireless devices. Network VAPT can help you discover and exploit any network vulnerabilities.
Forensic Investigation
Digital forensics and incident response services to investigate security breaches and recover critical data from compromised systems.
OSINT
OSINT, or Open Source Intelligence, is the practice of gathering and analyzing publicly available information to detect security threats. This proactive cybersecurity strategy enhances threat detection, risk mitigation, and compliance efforts, safeguarding digital assets effectively while staying ahead of emerging threats.
MY SKILLS
HTML & CSS
95%JavaScript
90%Python
85%Cybersecurity Tools
88%Network Analysis
82%Digital Forensics
80%Database Management
78%Cloud Security
75%Ethical Hacking
85%EXPERIENCE
Intern @ BugsBd Limited
Dec 2025 - Feb 2026Penetration Tester
Was engaged as a Penetration Tester Intern and carried out security tests on Websites and Network to determine weaknesses using standardized techniques and methodologies such as OWASP WSTG for Web Security Testing Guide. Worked alongside the security team to evaluate the test results, exploit the vulnerability, and evaluate its impact in the real world, while delivering a professional Vulnerability Assessment and Penetration Test Report that is compliant with PCI DSS Security Standards.