Iโm Nitin Dhurve, a Cybersecurity Aspirant, Bug Bounty Hunter, and Security Researcher. Currently pursuing B.Tech in Cyber Security at CU Jammu (2023โ2027), I specialize in ethical hacking, penetration testing, and network security.
With hands-on experience in real-world bug bounties, TryHackMe top 10% labs, and hackathon wins, Iโm passionate about breaking systems to secure them. My focus is on offensive security, exploit development, and practical hacking techniques that help organizations stay ahead of evolving cyber threats.
- ๐ฏ Bug Bounty Hunting โ Active on HackerOne with real-life vulnerability findings.
- ๐ก Ethical Hacking & Pentesting โ Web, network, IoT, and wireless security.
- ๐ก Networking & Security Labs โ 30+ tutorials on VLANs, ACLs, DHCP spoofing, etc.
- ๐ Cybersecurity Projects โ Building security tools like Phish-Detector and Automated Traffic Analyzer.
- ๐ Hackathon Achievements โ 1st Rank (IoT Security), Runner-up in multiple CTFs.
- Cybersecurity Tools: Kali Linux, Burp Suite, Nmap, Wireshark, Metasploit
- Programming & Scripting: Python, C, C++, Bash
- Networking: CCNA-level skills, Cisco Packet Tracer, SDN concepts
- Web Security & Dev: HTML, CSS, Flask
- Platforms: HackerOne (@mrzerotrace), TryHackMe (Top 10%)
- ๐ B.Tech Cyber Security | Central University of Jammu (2023โ2027)
- ๐ Certified Ethical Hacker (CEH โ EC Council)
- ๐ Linux Privilege Escalation (TryHackMe)
- ๐ Bug Bounty & Ethical Hacking Certifications
๐ Portfolio ๐ GitHub ๐ผ LinkedIn ๐ฅ YouTube
๐ Always curious about new exploits, red teaming challenges, and CTFs. Letโs connect & collaborate on cybersecurity and ethical hacking projects ๐ฅ.
๐จโ๐ป "I'm a tech geek who believes that the best way to predict the future is to create it. Always up for a challenge, whether it's a complex coding problem or a cybersecurity puzzle. Let's connect and innovate together!"
๐ Why did the Python developer break up with his girlfriend?
Because she had too many C++ issues.
๐ Why donโt hackers ever get locked out of their houses?
Because they always have a backdoor.
Feel free to reach out via email: [email protected]