I am a cybersecurity innovator specializing in the intersection of Artificial Intelligence and Offensive Security
Self-Paced via Coursera, Udemy & Cisco Networking Academy & More | 2024 - Present
▪ Specialized in Offensive Security, mastering the full spectrum of advanced penetration testing techniques from reconnaissance to post-exploitation.
▪ Developed a unique expertise at the intersection of Cybersecurity and Artificial Intelligence, focusing on building practical, AI-driven solutions.
▪ Proficient in advanced Prompt Engineering (PE-CEH), with a proven ability to command AI for complex security tasks.
▪ Engaged in extensive hands-on, project-based learning, transforming theoretical knowledge into real-world tools and capabilities.
▪ This continuous, self-paced professional development is my strategy for staying at the cutting edge of the industry.
DAWN SCIENCE COLLEGE, Barnala | 2022 - 2024
▪ Acquired a robust foundation in programming (C++), problem-solving, and networking.
▪ Functioned as Class Representative, overseeing both academic and extracurricular initiatives.
▪ Contributed as an engaged participant in Cricket and Football teams, enhancing teamwork and discipline.
▪ Cultivated leadership and management skills through effective class coordination...
GOVT. HIGH SCHOOL FOR BOYS, HAZARA MUGHLAN,Gujrat | 2020-2022
▪ Secured top academic honors in Computer Science.
▪ Enhanced leadership abilities as Class Monitor and Senior Organizer.
▪ Troubleshot and resolved computer issues as a Lab Solver, aiding fellow students.
▪ Developed teamwork and resilience as a member of the Football Team.
The PenTrix · Self-employed / Remote | Jan 2022 – Present
• Founded The PenTrix — a cybersecurity initiative to share practical hacking knowledge, tools, and tutorials with aspiring learners.
• Conducted penetration tests on networks, systems, and web apps, identifying vulnerabilities through simulated attacks.
• Executed privilege escalation techniques in Windows and Linux environments, gaining hands-on system-level access.
• Utilized tools such as Kali Linux, Parrot OS, Metasploit, Burp Suite, Nmap, Hydra, John the Ripper, and custom scripts.
• Mastered core skills including reconnaissance, enumeration, exploitation, and post-exploitation.
• Continuously learning advanced concepts: red teaming, offensive security tactics, CTFs, and secure coding practices.
• Building The PenTrix blog — featuring actionable tutorials, beginner roadmaps, custom scripts, and lab walkthroughs.
Intern Intelligence | Mar 2025 - Present
• Identified security vulnerabilities through manual and automated penetration testing methods.
• Performed code reviews and vulnerability scans to assess the security posture of web applications.
• Enhanced organizational security policies by reporting findings and suggesting actionable improvements.
• Supported incident response initiatives by contributing to real-time detection and mitigation strategies.
Cisco Networking Academy | 2025 - Present
• Practiced advanced penetration testing and cybersecurity skills through hands-on labs and simulations.
• Completed and documented a wide range of labs covering routing, switching, firewall rules, and security protocols.
• Improved practical understanding by consistently solving challenges and applying theoretical knowledge.
• Continually progressing through new modules to enhance proficiency and stay current with cybersecurity and hacking trends.
YoungDev Intern | 2025 - Present
• Gained hands-on experience in penetration testing and security assessments across various systems.
• Contributed to developing a secure IT environment through continuous monitoring and risk analysis.
• Delivered user awareness training to promote proactive cybersecurity practices and minimize human-related vulnerabilities.
• Applied strong problem-solving skills to identify threats and implement effective security solutions.
Rhombix Technologies | Mar 2025 - Present
• Strengthened network defense capabilities by developing a basic network packet sniffer.
• Enhanced cybersecurity awareness through the design and delivery of phishing training initiatives.
• Applied concepts of cybersecurity and ethical hacking in real-world scenarios to build hands-on expertise.
• Expanded skill set across key areas such as vulnerability assessment, social engineering, and network security.
Prodigy InfoTech | 2025 - Present
• Engaged in ethical hacking and penetration testing to enhance cybersecurity defenses.
• Utilized Python to develop various tools, expanding knowledge and experience in programming, cybersecurity, and automation.
• Conducted network packet analysis to identify and assess potential threats and system vulnerabilities.
• Designed and implemented security solutions to address real-world cybersecurity challenges and improve system protection.
Intel-Scan Pro
A dual-interface (CLI + GUI) reconnaissance framework built with Python, Rich, and Gradio.
View on GitHubThe PenTrix Web Platform
A dedicated website for The PenTrix, the Cybersecurity Initiative I founded.
View on GitHubAI-Terminal-X
An intelligent, AI-powered assistant for the Linux terminal, designed to streamline cybersecurity workflows.
View on GitHubAI-CMD-X
An AI-driven, super-intelligent assistant for the Windows Command Line, built for efficiency.
View on GitHubKeyTrace
An ethical keystroke logger in Python for authorized security testing and research.
View on GitHubSNIFF-X
An interactive, Python-based ethical packet sniffer to capture and analyze real-time network traffic.
View on GitHubKEYGEN-X
A secure, fast, and interactive password generator developed using C++ and Python.
View on GitHubPassive Recon Automation
A comprehensive Bash script to automate the initial phase of passive information gathering.
View on GitHubActive Recon Automation
A powerful Bash script designed to automate active information gathering and scanning tasks.
View on GitHub(FORAGE) | Remote
▪ Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team.
▪ Analyzed and identified areas needing stronger security training and implemented training.
▪ Helped identify and report security threats such as phishing.
(FORAGE) | Remote
▪ Completed a job simulation as a Goldman Sachs governance analyst responsible for assessing IT security.
▪ Identified outdated password hashing algorithms by cracking passwords using Hashcat.
▪ Suggested security improvements including stronger password hashing methods.
(FORAGE) | Remote
▪ Completed a cybersecurity threat analysis simulation for the Cyber Defense Unit.
▪ Researched vulnerabilities and guided teams on remediation strategies.
▪ Utilized Python to write a script for ethical hacking and decryption.
(FORAGE) | Remote
▪ Served as a security analyst investigating cybersecurity threats in ANZ Australia.
▪ Performed packet capture (PCAP) analysis to detect malicious activities.
▪ Used tools like Wireshark, Tshark, and Hex Editor for forensic investigations.
Social
Find More At
linkedin
Visit & Check & ConnectGitHub
Visit & CheckWhatsApp
Can Messege Me Here..!