ryx

Rushi Padhiyar

As a 20-year-old cybersecurity student, I am interested in Penetration Testing, Malware Analysis, Security Operations Centre (SOC), and Security Research. I participate in CTF and Bug Bounty challenges, am an ambassador for* InfoSec Writeups Community*, and have given talks at Null Community Meetups. I am most active on GitHub & Twitter. Right now I am in the Top 1% on TryHackMe platform

I've led successful cybersecurity projects in Hackathons, including one that won for Malware Analysis. I have strong Linux and scripting skills, which are helpful in handling security tasks.

I am currently working on a college project under the supervision of an Amazon Security Engineer, gaining practical experience in** Incident Response and Threat Mitigation**.

Projects

SecureByte

This is a FUD crypter aka SecureByte that uses RSA and AES encryption to encrypt a payload and create an obfuscated executable file that can evade any antivirus detection in market at present.Python, AES, RSA, Code Obfuscation, Malwares/Virus/Rats, Antivirus Softwares, VirusTotal

FUD Crypter

A tool used for the red teams to evaluate the effectiveness of antivirus and firewall system.Tkinter, Python, AES, Encryption, RSA, ECC, Pyarmor

Nexus Sentinel - Cyber Threat Monitoring System

Nexus Sentinel is an advanced cyber threat monitoring solution with real-time visibility. It uses honeypots and advanced visualization to detect, analyze, and respond to risks of global cyber threatsMicrosoft Azure, API, Power Shell, KQL

Skills

Python
Linux
Penetration Testing
Computer Networking
Web Application Development

Experience

  • HackerOne - Security
  • HackerOne - Security Researcher
    October 2022 - Present

    My work as a Security Researcher at HackerOne involves
    performing vulnerability assessments on different programs and systems
    to detect and report security weaknesses.

    This requires knowledge of cybersecurity principles, awareness of typical
    attack vectors and techniques, and strong analytical and problem-solving
    skills to identify vulnerabilities. I provide precise descriptions of the security
    flaws and recommend effective remediation measures.