I'M PEVINKUMAR A

Jr Penetration Tester | Programmer | Aspiring Red Teamer

— Kevin Mitnick
Avatar

ABOUT

Hello! I'm pevinkumar A, pursuing the final-year Cybersecurity undergraduate degree with a passion for offensive security, tool development, and real-world attack simulation. I specialize in penetration testing, recon automation, and building custom tools to simplify repetitive tasks.

Currently focusing on improving red team tradecraft, building custom recon frameworks, and contributing to ethical hacking communities. Open to junior pentesting or security research roles where I can continue learning, building, and breaking.

WHAT I'M DOING NOW?

🎓 Current Education:

  • Pursuing the final year of my undergraduate studies in computer science specialize in Cybersecurity.
  • Continuously exploring ethical hacking, penetration testing, and hands-on security labs through platforms like TryHackMe.
  • Building security tools and framework to orchestrate technologies.

Timeline: 2023 – Present

💻 Active Engagements:

  • Contributing to open-source security tools like SubProber.
  • Learning advanced pentesting techniques through labs and CTFs.
  • Improving tool development skills with Python & Bash.
  • Exploring Red Team tactics and automation.
Ongoing since: 2024

EXPERIENCE

Tool Developer ⚒️

2024 – Present

Built tools like PhonyARP, RootESC , HTTP-Prober, and RaaSMonarch for recon automation.

🔎 CTF Player & Researcher

2024 – Present

TryHackMe Badge Solved 90+ TryHackMe labs (Top 1% globally) with 200+ room completion. Found security issues on HackerOne's public platforms & public VDPs.
View Profile

Cybersecurity Intern 🏢

Prompt InfoTech | May–June 2025

Assisted in real-world pentesting and built a custom IP Logger tool.

⚡ Offensive Security Intern

InLighn Tech | May–June 2025

Practical learning with real-world attacks and custom tool building. Built hash-brute for cracking hashes.

Open Source Contributor 🕸️

2025 – Present

Contributor at RevoltSecurities supporting the development of SubProber through pre-release testing.

PORTFOLIO

Metasploitable2:

Black Box Pentesting

Conducted a comprehensive black-box penetration test on Metasploitable2, successfully exploiting over 25 vulnerabilities (excluding DVWA), and documented all findings in detail.

⚒️ Tools used: Nmap, Metasploit, Hydra, etc
🏷️ Tags: Recon, Exploitation, Post-Exploitation
View Report

RaaSMonarch (v1.0.0):

Recon Automation Framework

Developing RaaSMonarch(Recon-as-a-Service) Framework v1.0.0 to automate the recon process through a user-friendly web interface, eliminating the complexity and frustration of managing multiple tools manually.

🧪 Tech Stack: Python, PHP, Docker
🏷️ Tags: Pentesting, Automation, Tool Build
Preview

CVE-2025-32463:

Sudo Privilege Escalation

A vulnerability affecting Sudo versions <1.9.17p2. I developed a Python-based PoC demonstrating how attackers can escalate privileges by abusing chroot call from sudo utility.

🛠️ Type: Local Privilege Escalation
🧪 Tech Stack: Python
🏷️ Tags: Exploit development ,PoC development, Security Research.

CTF-HUB Coffee Shop

Custom CTF Room

A multi-page vulnerable coffee shop web app built for security testing and learning purposes. It is purposely vulnerable to common web security issues, making it suitable for penetration testing, security training, and CTF challenges.

🧪 Tech Stack: PHP, Bash, Docker
🏷️ Tags: Development, OSINT, IDOR, LFI, Command Injection

KeySnatcher:

Keylogger with Attack Simulation

Designed and simulated a keylogger attack to demonstrate the keystrocks capture, secure encryption, and network-based exfiltration of keystrokes to a remote server.

🧪 Tech Stack: Python
🏷️ Tags: Keylogger, Malware development

RootEsc:

Privilege Escalation Analysis Tool

Designed and implemented a privilege escalation analysis tool to gain a deeper understanding of enumeration utilities such as LinPEAS and WinPEAS. It automate the analysis process with the help of bash.

🧪 Tech Stack: Python, Bash
🏷️ Tags: Linux, Post-Exploitation
View on GitHub

PhonyARP:

ARP spoofing tool

Developed and simulated an ARP spoofing tool to simulate MITM attacks, aimed at gaining a comprehensive understanding of ARP spoofing mechanisms, MITM attack vectors, and effective defense strategies against such threats.

🧪 Tech Stack: Python
🏷️ Tags: Scapy, ARP, MITM
View on GitHub

CVE-2025-47812:

WingFTP Remote Code Execution

A vulnerability affecting WingFTP versions <=7.4.3. I developed a Python-based extended exploit to demonstrate and enhance the exploit with custom temporary shell ,also has reverse shell feature.

🛠️ Type: Remote Code Execution
🧪 Tech Stack: Python
🏷️ Tags: Exploit development ,PoC development, Security Research.

Abandoned-Gate:

Custom CTF Room

Built custom CTF challenge to learn and practice chaining of three critical vulnerability like File upload to RCE to privilege escalation in a secured controlled environment (container).

🧪 Tech Stack: PHP, Bash, Docker
🏷️ Tags: Development, Insecure FileUpload, RCE, Privilege Escalation
View on GitHub

HTTP Prober:

Status code probing tool

Developed an asynchronous HTTP probing tool to retrieve status codes for given URLs, and packaged it for distribution on PyPI with a user-friendly interface to streamline status code analysis.

🧪 Tech Stack: python
🏷️ Tags: Reconnaissance, Automation, Httpx, Tool Developement
View on GitHub

CryptiHub:

Encrypted Chat Traffic Analysis

Developed a E2E encrypted chat room app with GUI clients also Conducted traffic analysis to explore potential eavesdropping vectors under simulated adversarial conditions.

🧪 Tech Stack: python
🏷️ Tags: Insecure FileUpload, RCE, Privilege Escalation

Simple-Site:

LAMP stack Learning project

A beginner-friendly LAMP stack running inside Docker for learning and testing purposes like it uses raw SQL queries making it vulnerable to SQL Injection, the DB uses a default root password (example) ,it also configured directory listing in Apache.

🧪 Tech Stack: Linux, Apache, MySQL, PHP
🏷️ Tags: Lab build, Sqli, Security misconfigurations

BLOGS & WRITE-UPs

CVE-2025-8088

CVE-2025-8088

Path Traversal vulnerability.

View
CVE-2025-32463

CVE-2025-47812

RCE Through improper username validation.

View
CVE-2025-32463

CVE-2025-32463

Privilege escalation via sudo

View
ARP Spoofer

ARP Spoofing

Basic MITM simulation

View
XSS

XSS Walkthrough

Basic to advance

View
SQLi

SQL Injection

Beginner Guide

View
ARP Spoofer

Buffer Overflow

Basic Guide

View

MY JOURNEY SO FAR

0

Learning Hours

0

Lab Hours

0

Projects Completed

0

Blogs Written

LET'S CONNECT

Have a question, project idea, or just want to say hello? Drop a message below!

© 2025 Pevinkumar A — All rights reserved.