I'm a passionate and self-driven Ethical Hacker & Penetration Tester with a strong foundation in Cybersecurity.
Cisco Networking Academy | 2024 - Present
▪ Successfully completed the Introduction to Cybersecurity course, establishing a solid understanding of foundational cyber principles.
▪ Currently pursuing the Ethical Hacking course, expanding practical skills in penetration testing and system security.
▪ Actively building expertise in ethical hacking, cybersecurity, and programming, preparing to lead in the cybersecurity industry.
▪ Engaged in hands-on labs and practicals, developing reports and applying theoretical knowledge to real-world scenarios.
▪ Maintained a well-documented record of all assignments, projects, and practicals—approaching learning with the structure and discipline of a university-level program.
▪ Until officially joining Howest University, utilizing this period as a dedicated learning phase to sharpen critical technical skills and enhance cyber awareness.
DAWN SCIENCE COLLEGE, Barnala | 2022 - 2024
▪ Acquired a robust foundation in programming (C++), problem-solving, and networking.
▪ Functioned as Class Representative, overseeing both academic and extracurricular initiatives.
▪ Contributed as an engaged participant in Cricket and Football teams, enhancing teamwork and discipline.
▪ Cultivated leadership and management skills through effective class coordination...
GOVT. HIGH SCHOOL FOR BOYS, HAZARA MUGHLAN,Gujrat | 2020-2022
▪ Secured top academic honors in Computer Science.
▪ Enhanced leadership abilities as Class Monitor and Senior Organizer.
▪ Troubleshot and resolved computer issues as a Lab Solver, aiding fellow students.
▪ Developed teamwork and resilience as a member of the Football Team.
The PenTrix · Self-employed / Remote | Jan 2022 – Present
• Founded The PenTrix — a cybersecurity initiative to share practical hacking knowledge, tools, and tutorials with aspiring learners.
• Conducted penetration tests on networks, systems, and web apps, identifying vulnerabilities through simulated attacks.
• Executed privilege escalation techniques in Windows and Linux environments, gaining hands-on system-level access.
• Utilized tools such as Kali Linux, Parrot OS, Metasploit, Burp Suite, Nmap, Hydra, John the Ripper, and custom scripts.
• Mastered core skills including reconnaissance, enumeration, exploitation, and post-exploitation.
• Continuously learning advanced concepts: red teaming, offensive security tactics, CTFs, and secure coding practices.
• Building The PenTrix blog — featuring actionable tutorials, beginner roadmaps, custom scripts, and lab walkthroughs.
Intern Intelligence | Mar 2025 - Present
• Identified security vulnerabilities through manual and automated penetration testing methods.
• Performed code reviews and vulnerability scans to assess the security posture of web applications.
• Enhanced organizational security policies by reporting findings and suggesting actionable improvements.
• Supported incident response initiatives by contributing to real-time detection and mitigation strategies.
Cisco Networking Academy | 2025 - Present
• Practiced advanced penetration testing and cybersecurity skills through hands-on labs and simulations.
• Completed and documented a wide range of labs covering routing, switching, firewall rules, and security protocols.
• Improved practical understanding by consistently solving challenges and applying theoretical knowledge.
• Continually progressing through new modules to enhance proficiency and stay current with cybersecurity and hacking trends.
YoungDev Intern | 2025 - Present
• Gained hands-on experience in penetration testing and security assessments across various systems.
• Contributed to developing a secure IT environment through continuous monitoring and risk analysis.
• Delivered user awareness training to promote proactive cybersecurity practices and minimize human-related vulnerabilities.
• Applied strong problem-solving skills to identify threats and implement effective security solutions.
Rhombix Technologies | Mar 2025 - Present
• Strengthened network defense capabilities by developing a basic network packet sniffer.
• Enhanced cybersecurity awareness through the design and delivery of phishing training initiatives.
• Applied concepts of cybersecurity and ethical hacking in real-world scenarios to build hands-on expertise.
• Expanded skill set across key areas such as vulnerability assessment, social engineering, and network security.
Prodigy InfoTech | 2025 - Present
• Engaged in ethical hacking and penetration testing to enhance cybersecurity defenses.
• Utilized Python to develop various tools, expanding knowledge and experience in programming, cybersecurity, and automation.
• Conducted network packet analysis to identify and assess potential threats and system vulnerabilities.
• Designed and implemented security solutions to address real-world cybersecurity challenges and improve system protection.
AI-Terminal-X
An AI Powered Super Intelligence Linux Terminal Assistant devloped by Me
Visit & ExploreWeb Platform for The PenTrix
A dedicated Website developed for The PenTrix, a Cybersecurity Initiative I Founded
Visit & ExploreKEYGEN-X
Developed a (C++ and Python) Based secure, fast, and interactive password generator
Visit & CheckKEYTRACE
Developed an Pyhton Based ~Ethical keystroke logger for authorized security testing and research
Visit & CheckSNIFF-X
Developed an Pyhton Based Interective Ethical packet sniffer to analyze real-time network traffic
Visit & CheckPersonal Portfolio
I utilized an existing template, made modifications, and customized it to create My Personal Portfolio
Visit & Check(FORAGE) | Remote
▪ Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team.
▪ Analyzed and identified areas needing stronger security training and implemented training.
▪ Helped identify and report security threats such as phishing.
(FORAGE) | Remote
▪ Completed a job simulation as a Goldman Sachs governance analyst responsible for assessing IT security.
▪ Identified outdated password hashing algorithms by cracking passwords using Hashcat.
▪ Suggested security improvements including stronger password hashing methods.
(FORAGE) | Remote
▪ Completed a cybersecurity threat analysis simulation for the Cyber Defense Unit.
▪ Researched vulnerabilities and guided teams on remediation strategies.
▪ Utilized Python to write a script for ethical hacking and decryption.
(FORAGE) | Remote
▪ Served as a security analyst investigating cybersecurity threats in ANZ Australia.
▪ Performed packet capture (PCAP) analysis to detect malicious activities.
▪ Used tools like Wireshark, Tshark, and Hex Editor for forensic investigations.
Social
Find More At
linkedin
Visit & Check & ConnectGitHub
Visit & CheckWhatsApp
Can Messege Me Here..!