[ OPERATOR ONLINE ]
IDENTITY::CLASSIFIED

HEMANTH

KARAL VARMAA

>> _
Red Team AI Security VAPT OSINT Python Dev
SCROLL TO EXPLORE
01

ABOUT

HM
RECON
EXPLOIT
DEFEND
INTEL
// OPERATOR DOSSIER

My story began in 8th standard — long before I understood what cybersecurity really was. All I knew was one thing: I loved hacking — not "ethical hacking"... just hacking.

Starting as a Bio-Maths student, my curiosity didn't follow a normal academic path. I'd install random tools on my dad's computer, break it, corrupt it, fix it — repeat. My first attack technique was phishing, like a typical script-kiddie exploring the digital world without limits.

Today, I build AI-powered cybersecurity tools, lead red team operations, and architect secure systems against real-world threats.

3+
YEARS OPS
4
CERTS
2
DEPLOYMENTS

"Every breached system teaches you more than a textbook ever will."

— 0xDEADVrm
02

ARSENAL

OFFENSIVE
Red Teaming 92%
VAPT 88%
Social Engineering 85%
Exploit Dev 75%
INTELLIGENCE
OSINT 94%
Threat Analysis 87%
Network Forensics 80%
Log Analysis 82%
DEV & AI
Python 91%
AI Security 83%
ML for CyberSec 78%
Tool Development 88%
// TOOLS & PLATFORMS
Kali
Burp
Metasploit
Wireshark
Nmap
Shodan
Amass
Subfinder
DNSx
crt.sh
Python
GhostScan
03

OPERATIONS

FEATURED
OP::GHOSTSCAN

GhostScan

Automated recon + subdomain scanning tool engineered for OSINT & vulnerability workflows. Combines passive footprinting, live resolution, and intelligent filtering into a single operator pipeline.

Security Tool Python OSINT Recon
View Source
# ghostscan v1.0 — operator mode
$ ghostscan --target target.com
[*] Initializing recon pipeline...
  [+] DNS enum → 14 records found
  [+] Subdomain scan → 37 hosts
  [+] Live resolution → 22 active
  [!] Exposed panel → admin.target.com:8080
  [!] Dev subdomain → dev.target.com
  [*] Building intel map...
  [✓] Report saved → ./ghostscan_20241124.json
DEPLOYMENT::HYBRID

IITM MedsecureX

Security Analyst role focused on vulnerability assessment, threat modeling, and security architecture review for healthcare-grade digital infrastructure.

Analyst Healthcare Security VAPT
DEPLOYMENT::ONLINE

Learnflu

Cybersecurity internship focusing on practical security workflows, threat research, and hands-on vulnerability identification across web and network attack surfaces.

Intern Web Security Research
04

ORIGIN

2019 — 8TH STANDARD

First Contact

Started as a Bio-Maths student. Discovered a passion for breaking and rebuilding systems. First foray into phishing and social engineering — learning how humans are the weakest vector.

2021 — YEAR 1

Panimalar Engineering College

Enrolled in CSE. Mentored by senior operators: Kabil Preetham K, Sanjai S, Amithabh D K, Sanjith Roshan U,Rishyendra M and others who shaped the foundation of my technical and operational mindset.

2022 — LEADERSHIP

Cyber Security Club — Co-ordinator

Appointed Student Co-ordinator by Sanjai S. Led workshops, coordinated CTF events, and mentored junior members into practical security workflows.

2023 — FIELD OPS

First Real-Time Project + Deployments

Kabil Preetham K opened the door to the first real-time project. Simultaneously deployed at Learnflu and IITM MedsecureX as Security Analyst. Built GhostScan.

NOW — ACTIVE

Autonomous Threat Research

Building AI-powered cybersecurity tools. Focused on red teaming, autonomous threat detection, AI security research, and secure architecture design for real-world digital ecosystems.

05

CREDENTIALS

CISCO
Ethical Hacking
Certified Operator
C-DAC HYD
ML for CyberSec
Advanced Track
NIELIT KERALA
ML Using Python
Certified
NIELIT KERALA
Python Fundamentals
Certified
06 // INITIATE CONTACT

OPEN
CHANNEL

Available for red team engagements, security research collaborations, and AI-powered security tool development.