> MODULE: PORTFOLIO_INDEX

Portfolio

[STATUS: OPERATIONAL]

> SYS: INVENTORY

[23 MODULES]

Linux

LINUX

Python

PYTHON

GoLang

GOLANG

Java

JAVA

JavaScript

JAVASC

React

REACT

NodeJS

NODEJS

Flask

FLASK

MongoDB

MONGOD

SQL

SQL

PowerShell

POWERS

Bash

BASH

Cloud

CLOUD

GCP

GCP

AWS

AWS

GitHub

GITHUB

Docker

DOCKER

Burp Suite

BURP S

Metasploit

METASP

NMap

NMAP

WireShark

WIRESH

Splunk

SPLUNK

NextJS

NEXTJS

[ TALKS DELIVERED ]

[08 RECORDS]

[REC: 01]SCHED

BSides Kent 2026

Offensive Go, Driven by Python: Building Hybrid Offensive Toolchains

A practical look at building hybrid offensive toolchains by leveraging Python for orchestration and Go for performance-critical operations.

[REC: 02]SCHED

BSides Birmingham 2026

Offensive Go, Driven by Python: When Familiar Toolchains Hide Unfamiliar Power

A deep dive into designing hybrid offensive security tools where Python orchestrates high-performance Go modules for scalable and automated security assessments.

[REC: 03]ACTIVE

Warsaw IT Days 2026

Anatomy of Ransomware-as-a-Service: How Attacks Actually Unfold

A deep dive into the operational ecosystem of modern ransomware, breaking down how RaaS groups organize, execute, and monetize attacks in today’s cybercrime economy.

[REC: 04]ACTIVE

pwnEd7 - University of Edinburgh

Application Security in the Age of Cloud Automation

Breaking the Cloud Boundary: How simple web application flaws can escalate into full cloud compromise through automation, trust relationships, and misconfigured workflows.

[REC: 05]ACTIVE

SecTor 2025

SwitchWatch: Unified Threat Detection and Compliance Auditing for Cisco Networks

Presented SwitchWatch, a custom-built security tool that unifies configuration compliance checks, threat-context config diffing, port usage visualization, and AAA log analysis for Cisco networks.

[REC: 06]ACTIVE

Black Hat MEA 2024

AegisScan - An AI-based Vulnerability Scanner

Presented AegisScan, an advanced web application vulnerability scanner leveraging OWASP ZAP and AI-driven analysis for scalable penetration testing automation.

[REC: 07]ACTIVE

SecTor 2024

Cyber-Arsenal47

Presented Cyber-Arsenal47, a modular offensive security toolkit designed for penetration testers and red teamers to automate reconnaissance, exploitation, and post-exploitation tasks.

[REC: 08]ACTIVE

The Hack Summit 2023

Entering the Cloud Kingdom with keys from Web Apps

An introduction to how vulnerabilities in modern web applications can unintentionally expose the keys that unlock cloud infrastructure.

[ CERTIFICATIONS ]

[06 RECORDS]

[REC: 01]ACTIVE

Web Application Penetration Tester Extreme (eWPTX)

Web Application Penetration Tester Extreme (eWPTX)

PROVIDER: INE

ISSUED: January 11, 2026

EXPIRES: January 11, 2029

[REC: 02]ACTIVE

Cybersecurity Analyst (CySA+)

Cybersecurity Analyst (CySA+)

PROVIDER: CompTIA

ISSUED: June 08, 2025

EXPIRES: June 08, 2028

[REC: 03]ACTIVE

Practical Mobile Pentest Associate (PMPA)

Practical Mobile Pentest Associate (PMPA)

PROVIDER: TCM Security

ISSUED: July 27, 2024

EXPIRES: Does not Expire

[REC: 04]ACTIVE

Practical Network Penetration Tester (PNPT)

Practical Network Penetration Tester (PNPT)

PROVIDER: TCM Security

ISSUED: August 23, 2023

EXPIRES: Does not Expire

[REC: 05]ACTIVE

Certified Cloud Practioner (CCP)

Certified Cloud Practioner (CCP)

PROVIDER: AWS

ISSUED: May 18, 2023

EXPIRES: May 18, 2026

[REC: 06]EXPR

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

PROVIDER: EC-Council

ISSUED: May 10, 2021

EXPIRES: May 09, 2024

[ SECURITY PROJECTS ]

[09 RECORDS]

[REC: 01]ACTIVE

AegisScan

An advanced web application vulnerability scanner leveraging OWASP ZAP for automated security testing and vulnerability assessment. (To be made public soon)

[REC: 02]ACTIVE

Cyber-Arsenal47

A powerful CLI-based penetration testing toolkit that automates network scanning, enumeration, and exploitation. (To be made public soon)

[REC: 03]ACTIVE

Automated BoF

A python script to automate and guide Buffer Overflow Exploitation using Immunity Debugger

[REC: 04]ACTIVE

TIWAP

A Totally Insecure Web Application Project which allows a user to perform various attacks on the given target. It is a replication of DVWA with more vulnerabilities.

[REC: 05]ACTIVE

PyWebValidators

A package that allows to Validate Text and Files shared over Web.

[REC: 06]ACTIVE

VulnCMS

This box is all about CMS as its name suggests. You need to enumerate the box, find the CMS, and exploit in order to gain access to other and finally get the user and root flag.

[REC: 07]ACTIVE

CXplorer

An active reconnaissance tool capable of scanning for open ports, available directories, sub-directories and subdomains.

[REC: 08]ACTIVE

PassManager

A Java Based Password Manager which has features like storing User's Credentials as well as generate new passwords for them based on User's PII.

[REC: 09]ACTIVE

Black Hat Python

A collection of tools and scripts written in Python using reference from the book Black Hat Python.

[ DEVELOPMENT PROJECTS ]

[04 RECORDS]

[REC: 01]ACTIVE

React Admin Dashboard

A generic admin dashboard displaying organization statistics, manage team, invoices and presenting reports using multiple graphs.

[REC: 02]ACTIVE

Book Store

An Online Book Store which is a free, reliable, user interactive and fast management system providing features like CRUD operations on products, purchasing a product, adding to cart, proceeding with a payment gateway, etc.

[REC: 03]ACTIVE

Multi-User Blog

A Multi-User Blogging Platform which supports a number of features and is also SEO optimized, supports social logins, separate admin/user dashboards with their own authorized tasks like CRUD operations on Blogs, Categories and Tags.

[REC: 04]ACTIVE

Windows Screen Recorder

A basic screen recorder desktop application for windows developed using Python 3.9 and Tkinter. This tool supports audio recording as well and it merges the audio and video and provides the audio.

[]
SYS:OK──────────────────────© 2026 SIMARDEEP SINGH──────────────────────SOME RIGHTS RESERVED