Cybersecurity Researcher & Ethical Hacker

Adithyan V

Hands-on cybersecurity practitioner specializing in web application security, API security testing, Active Directory pentesting, Android application analysis, and SIEM-based threat detection. I don't just study security — I build labs and break things to understand them.
View Experience Contact Me
01 // About

Who I Am

root@kali:~$ whoami --verbose
> Adithyan V | Cybersecurity Student | Ethical Hacker | Palakkad, Kerala, India
> Domains: Web Security | API Security | AD Pentesting | Android Pentesting | SIEM | EDR

I'm a cybersecurity practitioner from Palakkad, Kerala, pursuing BCA through IGNOU. My training has been entirely hands-on — building real lab environments, conducting penetration tests, and operating SIEM and EDR solutions from scratch.

I've worked across both offensive and defensive security — from API security testing and Active Directory attacks to deploying Splunk and Wazuh for threat detection and endpoint monitoring. I also have practical experience in Android application penetration testing using dynamic analysis techniques with Frida.

My goal is to work in high-impact cybersecurity roles globally — in red team operations, SOC analysis, or application security — where I can apply everything I've built from the ground up.

02 // Skills

Technical Arsenal

// Security Tools
Core Toolset
Burp Suite Metasploit Nmap Wireshark Postman Frida Splunk Wazuh
// Offensive Security
Pentesting Domains
API Security Testing Web App Security Active Directory Pentesting Android App Pentesting Vulnerability Assessment
// Defensive Security
Detection & Response
SIEM Log Analysis Threat Detection EDR Incident Triage Alert Correlation
// Web Security
OWASP & Attack Techniques
SQLi XSS CSRF IDOR Broken Auth OWASP Top 10
// Operating Systems
Lab Environments
Kali Linux Ubuntu Windows Bash Scripting Python
// Mobile Security
Android Pentesting
Frida Dynamic Analysis Runtime Instrumentation Traffic Interception
03 // Experience

Hands-On Experience

API Security Testing
Postman · Burp Suite
  • Performed API request manipulation, authentication testing, and endpoint analysis to identify security weaknesses
  • Identified vulnerabilities including improper input validation, broken authentication, and insecure endpoints
  • Intercepted and modified HTTP/HTTPS traffic using Burp Suite to test API security controls
Active Directory Setup & Penetration Testing
Self-built Lab Environment
  • Built and configured Active Directory lab environments to simulate real enterprise network conditions
  • Performed user and group enumeration using industry-standard attack techniques
  • Practiced privilege escalation and lateral movement techniques in a controlled setting
Android Application Penetration Testing
Frida · Dynamic Analysis
  • Conducted dynamic analysis of Android applications using Frida for runtime instrumentation
  • Analyzed application behavior, traffic, and data storage to identify security vulnerabilities
  • Tested applications in controlled lab environments following mobile security best practices
TryHackMe — Cybersecurity Labs
Ongoing
  • Completed multiple labs covering web application security, network security, and system exploitation
  • Practiced real-world offensive and defensive security scenarios including CTF-style challenges
  • Strengthened enumeration, exploitation, and post-exploitation skills across varied environments
04 // Projects

What I've Built

📡
FLAGSHIP

AirSnoop

Wi-Fi Attack Detection Device — a hardware + software combo that passively monitors wireless traffic and detects rogue APs, deauth attacks, and evil twin attacks in real time. Built for home and enterprise network protection.

Python Raspberry Pi Scapy Wi-Fi 802.11 IDS Logic
🔎
ACTIVE

Splunk SIEM Setup

Configured Splunk for centralized log collection and real-time security monitoring. Detected suspicious activities through structured log analysis and built custom dashboards for threat visibility and security event correlation.

Splunk SPL Queries Log Analysis Dashboards Alert Rules
🛡️
ACTIVE

Wazuh EDR Setup

Deployed Wazuh as an Endpoint Detection and Response solution for system monitoring. Monitored file integrity, system activity, and security events — and investigated alerts to identify potential security incidents.

Wazuh EDR File Integrity Alert Triage Linux
05 // Certifications

Credentials & Roadmap

🎯
Certified Threat Intelligence & Governance Analyst (CTIGA)
✓ Completed
🔍
Foundation Level Threat Intelligence Analyst
✓ Completed
🎓
Certified Cybersecurity Educator Professional (CCEP)
✓ Completed
🔐
CompTIA Security+
▶ In Progress

Let's Connect

Looking for internships, collaborations, or just want to talk cybersecurity? I'm always open to connecting with the community.

Get In Touch