Hello There! I am

KARTHIK PARAMBIL

Pentester | Ethical Hacker | CTF Player

Resume

About Me

Passionate Cybersecurity Researcher & Pentester

I'm passionate about exploring the depths of cybersecurity, uncovering vulnerabilities, and building secure systems. My work spans ethical hacking,network pentesting , and offensive security with a current focus on Web Application Security.

"

As a Pentester and Ethical Hacker, my passion lies in uncovering vulnerabilities and strengthening security through responsible and effective exploitation.

Core Expertise

  • Vulnerability Assessment & Penetration Testing
  • Web Application Security
  • Network Security
  • Offensive Security Research

Current Focus

Specializing in modern and advanced web application security, identifying complex vulnerabilities, and developing robust security solutions for enterprise environments.

Technical Skills

Expertise across the cybersecurity spectrum

Penetration Testing

Advanced vulnerability assessment and exploitation techniques

Web App Security

OWASP Top 10, XSS, CSRF, SQL Injection, and modern web vulnerabilities

Network Security

Firewall management, IDS/IPS, VPN, and network protocol analysis

Cryptography

Encryption algorithms, digital signatures, and cryptographic protocols

Digital Forensics

Incident response, evidence collection, and forensic analysis

Reverse Engineering

Malware analysis, binary exploitation, and software reverse engineering

Technologies & Tools

Burp Suite Metasploit Wireshark Nmap Nikto Feroxbuster Hydra Ffuf SQLMap Nessus John the Ripper Hashcat Ghidra

Professional Certifications

Validated expertise in cybersecurity and information security

CompTIA

Security+

CompTIA

Industry-leading certification validating foundational cybersecurity skills and knowledge. Covers network security, compliance, threats, vulnerabilities, and security operations.

Focus: Core Security
Level: Entry to Intermediate
ADV
Offenso Hackers Academy

ADIS

Advanced Diploma in Information Security

Comprehensive advanced diploma covering enterprise-level information security management, risk assessment, security architecture, and advanced cybersecurity methodologies.

Focus: Enterprise Security
Level: Advanced

Projects

A showcase of my recent work across different cybersecurity domains. Each project represents a unique challenge and solution.

Custom CTF Challenges

Mission:Escape

Prison-Break themed Vulnerable Machines

A deliberately vulnerable machine contains Web Exploitation, misconfigurations, weak credentials, and logic flaws across Web and OS to "escape" by capturing the final flag.

Machines Web Exploitation Cryptography Privilage Escalation
Custom CTF Challenges

Mission:Space

Space themed Vulnerable Machines

A space-station themed Machine for Pentesting, focused on Web Exploitation, security misconfigurations, digital forensics and privilege escalation challenges within a simulated space station environment.

Machines Web Exploitation Cryptography Privilage Escalation
CTF Challenges

CTF

Custom Capture The Flag Challenges

Custom-designed Capture The Flag challenges for various skill levels. Each challenge focuses on specific cybersecurity concepts and requires creative problem-solving approaches for success.

Web Exploitation Forensics
10+
Challenges
2+
Categories
gfinder

Gfinder

Web based finding tool

Gfinder is a powerful search tool to find code, files, and hidden secrets instantly using powerful filters and clear visual results with displays the equivalent Linux command.

Python
gfinder

Scanix

Automated reconnaissance suite for web applications

Scanix is a powerful automation tool that streamlines the initial reconnaissance phase of penetration testing. It orchestrates multiple security tools Nmap, Feroxbuster, Nikto across parallel terminals to provide comprehensive target assessment.

Bash
Pwnkit Collection

Pwnkit

Collection of Pentesting Automation Scripts

Comprehensive collection of Python and Bash scripts designed to automate penetration testing workflows. Features include network scanning, vulnerability assessment, and post-exploitation modules.

Automation Python Bash
5+
Scripts
85%
Time Reduction
Custom CTF Challenges

LXD2ROOT

LXD Privilege Escalation Exploit

Automated LXD exploitation script where users in `lxd` group allows root access through container breakout. Exploits the LXD container breakout vulnerability to gain root access on target systems.

CVE-2023-5536 Privilege Escalation LXD Container
CTF Writeups

CTF Writeups & Solutions

Capture The Flag Challenge Solutions

Comprehensive collection of detailed CTF writeups featuring step-by-step exploitation techniques, vulnerability analysis, and creative problem-solving approaches from various cybersecurity competitions.

Web Exploitation Cryptography Forensics Tryhackme
20+
Solves
6+
Categories

Experience

Offenso Hackers Academy

Cybersecurity Trainee

Full-time
2025 - Present

Assisted in vulnerability assessments, penetration testing, and security audits under expert supervision. Gained practical experience with tools like Nmap, Metasploit, and Wireshark. Developed Custom CTFs and foundational skills in network security, ethical hacking, and secure coding practices.

Cybersecurity Researcher

2025 - Present

Conducting vulnerability research, penetration testing, and developing CTF challenges.

CTF Player

2025 - Present

Competing in various cybersecurity competitions with focus on Offensive Security

Let's Connect

Ready to collaborate on cybersecurity projects or discuss opportunities?

Ready to work together?

Whether you need penetration testing, security consultation, or want to collaborate on cybersecurity challenges, I'm always interested in new opportunities.