My story began in 8th standard — long before I understood what cybersecurity really was. All I knew was one thing: I loved hacking — not "ethical hacking"... just hacking.
Starting as a Bio-Maths student, my curiosity didn't follow a normal academic path. I'd install random tools on my dad's computer, break it, corrupt it, fix it — repeat. My first attack technique was phishing, like a typical script-kiddie exploring the digital world without limits.
Today, I build AI-powered cybersecurity tools, lead red team operations, and architect secure systems against real-world threats.
"Every breached system teaches you more than a textbook ever will."
— 0xDEADVrm
Automated recon + subdomain scanning tool engineered for OSINT & vulnerability workflows. Combines passive footprinting, live resolution, and intelligent filtering into a single operator pipeline.
Security Analyst role focused on vulnerability assessment, threat modeling, and security architecture review for healthcare-grade digital infrastructure.
Cybersecurity internship focusing on practical security workflows, threat research, and hands-on vulnerability identification across web and network attack surfaces.
Started as a Bio-Maths student. Discovered a passion for breaking and rebuilding systems. First foray into phishing and social engineering — learning how humans are the weakest vector.
Enrolled in CSE. Mentored by senior operators: Kabil Preetham K, Sanjai S, Amithabh D K, Sanjith Roshan U,Rishyendra M and others who shaped the foundation of my technical and operational mindset.
Appointed Student Co-ordinator by Sanjai S. Led workshops, coordinated CTF events, and mentored junior members into practical security workflows.
Kabil Preetham K opened the door to the first real-time project. Simultaneously deployed at Learnflu and IITM MedsecureX as Security Analyst. Built GhostScan.
Building AI-powered cybersecurity tools. Focused on red teaming, autonomous threat detection, AI security research, and secure architecture design for real-world digital ecosystems.
Available for red team engagements, security research collaborations, and AI-powered security tool development.