Hello There! I am

KARTHIK PARAMBIL

Penetration Testing | Ethical Hacker | CTF Player

Resume

About Me

Passionate Cyber Researcher & Pentester

I'm passionate about exploring the depths of cybersecurity, uncovering vulnerabilities, and building secure systems. My work spans ethical hacking,network pentesting and offensive security with a current focus on Active Directory Security.

"

As a Pentester and Ethical Hacker, my passion lies in uncovering vulnerabilities and strengthening security through responsible and effective exploitation.

Core Expertise

  • Vulnerability Assessment & Penetration Testing
  • Web Application Security
  • Network Security
  • Active Directory Security

Current Focus

Specializing in Active Directory security, identifying critical weaknesses, and improving identity and access security across enterprise environments.

Technical Skills

Expertise across the cybersecurity spectrum

Penetration Testing

Advanced vulnerability assessment and exploitation techniques

Web App Security

OWASP Top 10, XSS, CSRF, SQL Injection, HTTP Request Smuggling, Business Logic Flaws and Modern Web Vulnerabilities

Network Security

Firewall management, IDS/IPS, VPN, and network protocol analysis

Active Directory Security

Kerberos Attacks,NTLM Attacks, Privilege Escalation Paths, Lateral Movement, and Identity Misconfigurations

Digital Forensics

Incident response, evidence collection, and forensic analysis

Reverse Engineering

Malware analysis, binary exploitation, and software reverse engineering

Technologies & Tools

Burp Suite Metasploit Wireshark Nmap Gobuster Hydra Ffuf SQLMap Nessus John the Ripper Hashcat Ghidra Responder Impacket

Professional Certifications

Validated expertise in cybersecurity and information security

CompTIA

Pentest+

CompTIA

Industry-leading certification validating foundational cybersecurity skills and knowledge. Covers network security, compliance, threats, vulnerabilities, and security operations.

Focus: Core Security
Level: Entry to Intermediate
ADV
Offenso Hackers Academy

ADIS

Advanced Diploma in Information Security

Comprehensive advanced diploma covering enterprise-level information security management, risk assessment, security architecture, and advanced cybersecurity methodologies.

Focus: Enterprise Security
Level: Advanced

Projects

A showcase of my recent work across different cybersecurity domains. Each project represents a unique challenge and solution.

Custom CTF Challenges

Mission:Escape

Prison-Break themed Vulnerable Machines

A deliberately vulnerable machine contains Web Exploitation, misconfigurations, weak credentials, and logic flaws across Web and OS to "escape" by capturing the final flag.

Machines Web Exploitation Cryptography Privilage Escalation
Custom CTF Challenges

Mission:Space

Space themed Vulnerable Machines

A space-station themed Machine for Pentesting, focused on Web Exploitation, security misconfigurations, digital forensics and privilege escalation challenges within a simulated space station environment.

Machines Web Exploitation Cryptography Privilage Escalation
CTF Challenges

CTF

Custom Capture The Flag Challenges

Custom-designed Capture The Flag challenges for various skill levels. Each challenge focuses on specific cybersecurity concepts and requires creative problem-solving approaches for success.

Web Exploitation Forensics
10+
Challenges
2+
Categories
gfinder

Gfinder

Web based finding tool

Gfinder is a powerful search tool to find code, files, and hidden secrets instantly using powerful filters and clear visual results with displays the equivalent Linux command.

Python
gfinder

Scanix

Automated reconnaissance suite for web applications

Scanix is a powerful automation tool that streamlines the initial reconnaissance phase of penetration testing. It orchestrates multiple security tools Nmap, Feroxbuster, Nikto across parallel terminals to provide comprehensive target assessment.

Bash
Pwnkit Collection

Pwnkit

Collection of Pentesting Automation Scripts

Comprehensive collection of Python and Bash scripts designed to automate penetration testing workflows. Features include network scanning, vulnerability assessment, and post-exploitation modules.

Automation Python Bash
5+
Scripts
85%
Time Reduction
Custom CTF Challenges

LXD2ROOT

LXD Privilege Escalation Exploit

Automated LXD exploitation script where users in `lxd` group allows root access through container breakout. Exploits the LXD container breakout vulnerability to gain root access on target systems.

CVE-2023-5536 Privilege Escalation LXD Container
CTF Writeups

CTF Writeups & Solutions

Capture The Flag Challenge Solutions

Comprehensive collection of detailed CTF writeups featuring step-by-step exploitation techniques, vulnerability analysis, and creative problem-solving approaches from various cybersecurity competitions.

Web Exploitation Cryptography Forensics Tryhackme
20+
Solves
6+
Categories

Experience

Offenso Hackers Academy

Research and Development Member

Full-time
2025 - Present

Conducted security research and developed innovative cybersecurity solutions for emerging threats. Created comprehensive penetration testing labs and vulnerable environments for training purposes. Built hands-on Capture The Flag (CTF) challenges and realistic attack scenarios. Collaborated with teams to analyze attack vectors and develop defensive strategies.

Cybersecurity Researcher

2025 - Present

Conducting vulnerability research, penetration testing, and developing CTF challenges.

CTF Player

2025 - Present

Competing in various cybersecurity competitions with focus on Offensive Security

Let's Connect

Ready to collaborate on cybersecurity projects or discuss opportunities?

Ready to work together?

Whether you need penetration testing, security consultation, or want to collaborate on cybersecurity challenges, I'm always interested in new opportunities.