Dhakshan A
scanning targets...

// initializing profile

Cybersecurity Specialist & Pentester

1st-year B.Sc. Computer Science with Cyber Security at SRCAS. 6+ years in cybersecurity — pentester with proven strengths in networking, Linux, and ethical hacking.

System Monitor

Live process view — skills, tools, and stats as a running system.

dhakshan@kali — htop uptime: 6y 0m
CPU — Skill Utilization
Network Security
90%
Penetration Testing
85%
Linux / Shell
92%
Web App Security
80%
Malware Analysis
75%
OSINT
88%
Cryptography
70%
MEM — Stats
exp6+ years
pentests50+ completed
vulns100+ found
modeOFFENSIVE
PIDUSERCPU%MEM%COMMANDSTATUS
// Random Security Fact

Loading...

Click to see another

git log

Commit history — from first exploit to formal education.

dhakshan@kali:~/career ⎇ main
dhakshan@kali:~/career $ git log --graph --oneline --all
a3f9c2b HEAD → main B.Sc. Computer Science with Cyber Security 2025–present
commit a3f9c2b  |  Author: Dhakshan A  |  2025–present
feat: enrolled @ SRCAS — B.Sc. CS with Cyber Security
+ Formal education in cybersecurity fundamentals, network defense + Cryptography, ethical hacking, advanced exploitation research + Independent malware analysis alongside curriculum Institute: Sri Ramakrishna College of Arts & Science (SRCAS)
d7e1a89 Security Research & Bug Bounties 2022–2025
commit d7e1a89  |  Author: Dhakshan A  |  2022–2025
feat: independent research + bug bounty programs
+ 50+ vulnerability assessments completed + Deep-dived pentesting, web app security, network exploitation + Contributed to multiple open-source security tools Platforms: HackerOne, Bugcrowd, independent research
1b2d4f7 Early Security Exploration 2019–2022
commit 1b2d4f7  |  Author: Dhakshan A  |  2019–2022
init: first commit — CTF & Linux deep dive
+ Started with CTF competitions and Linux administration + Built home lab for attack/defense scenarios + Networking fundamentals mastered Platforms: HackTheBox, TryHackMe, PicoCTF
$ git tag --list
tagv1.0-network-security-fundamentalsCisco Networking Academy
tagv2.0-ethical-hacking-essentialsEC-Council
tagv3.0-linux-essentialsLinux Professional Institute
tagv4.0-python-for-cybersecuritySelf-directed Study

Repository Explorer

Live-fetched from GitHub. Click any row to inspect.

dhakshan@github:~/repos bash — 80×24
dhakshan@github:~/repos $ ls -la --color=auto
permissions lang name description updated
Fetching remote repositories...

Exploit DB

Vulnerability research, CTF writeups, and bug bounty findings.

dhakshan@exploit-db — searchsploit 4 results
dhakshan@kali:~ $ searchsploit --all --author=dhakshan
ID Severity Category Title Date
EDB-DA-001 CRITICAL Web Security IDOR → Account Takeover 2024-09
type Bug Bountycvss 9.8target Production Web App

Discovered an IDOR vulnerability allowing unauthorized access to any user profile. By manipulating the user_id parameter, an attacker could read, modify, or delete any account without authentication.

IDORAuth BypassAPIMass Assignment
EDB-DA-002 HIGH Active Directory AD Lateral Movement — Domain Admin 2024-03
type Lab Reportcvss 8.8target Internal AD

Full attack chain to Domain Admin via Kerberoasting, Pass-the-Hash, and BloodHound path analysis from foothold to full domain compromise.

KerberoastingPass-the-HashBloodHoundPrivEsc
EDB-DA-003 MEDIUM Binary Exploitation Buffer Overflow — Ret2Win 2023-11
type CTF Writeupcvss 6.5target 32-bit ELF

Stack-based buffer overflow using pwntools cyclic() to find offset, overwrote return address to redirect to win() for shell access. ASLR defeated via fixed offset.

Buffer Overflowret2winpwntoolsASLR bypass
EDB-DA-004 HIGH Wireless Security WiFi Deauth & Evil Twin AP 2023-07
type Researchcvss 7.4target WPA2 Network

Sent 802.11 deauth frames to force disconnection, stood up Evil Twin AP, captured WPA2 4-way handshakes, cracked PSK offline with Hashcat using wordlist + rules.

Evil TwinDeauthWPA2Aircrack-ngHashcat

Establish Connection

Open for projects, collaborations, and opportunities.

ssh-client v2.0 — network map LIVE
$ ssh-keyscan dhakshan0819 --verbose
Scanning known_hosts for dhakshan0819...
✓ Host dhakshan0819 is reachable (3 endpoints found)
RSA fingerprint: SHA256:dh4k5h4n+0ff3ns1v3s3cur1ty
Encryption: AES-256-GCM · ECDH key exchange · Perfect Forward Secrecy
─── available endpoints ─────────────────
SMTP
dhakshan0819@gmail.com
dhakshan0819@gmail.com
12ms
HTTPS
linkedin.com/in/dhakshan0819
Professional network · Open to DMs
8ms
GIT
github.com/dhakshan0819
Source code · Projects · Contributions
5ms
─── status ──────────────────────────────
3/3 endpoints online · 0% packet loss · avg 8ms
$
// Network Topology
dhakshan0819ORIGIN
gmail.comONLINE
linkedin.comONLINE
github.comONLINE
packets/s847
uptime99.9%
encryptionAES-256
modeACTIVE