Cybersecurity Professional

Penetration Tester | Red Teamer | Security Researcher

Specialized in web application security, network penetration testing, and red team operations. Passionate about offensive security and helping organizations strengthen their defenses through comprehensive security assessments and ethical hacking.

View My Work Get In Touch

Expertise & Skills

Web Application Security

Expert in comprehensive web application penetration testing using OWASP methodology. Proficient with Burp Suite, OWASP ZAP, and custom tools for vulnerability assessment, SQL injection, XSS, CSRF, and authentication bypass techniques.

Network Penetration Testing

Advanced network security assessments including network enumeration, service discovery, exploit development, and lateral movement. Expert with Nmap, Metasploit, custom scripts, and network protocol analysis for comprehensive infrastructure testing.

Red Team Operations

Full-scope red team engagements simulating advanced persistent threats. Specialized in social engineering, physical security testing, persistence mechanisms, and adversary simulation using frameworks like Cobalt Strike and custom C2 infrastructure.

Malware Analysis

Static and dynamic malware analysis using reverse engineering techniques, sandboxing environments, and behavioral analysis. Experience with IDA Pro, Ghidra, Wireshark, and custom analysis tools for threat intelligence and incident response.

Active Directory Security (Growing Expertise)

Developing advanced expertise in AD enumeration, privilege escalation, lateral movement, and domain compromise techniques using PowerShell, Bloodhound, Impacket, and Evil-WinRM. Gaining experience with post-exploitation, persistence mechanisms, and credential extraction in complex enterprise environments.

Mobile Security (Growing Expertise)

Developing expertise in mobile application security testing for Android and iOS platforms. Learning static/dynamic analysis, reverse engineering mobile apps, and security assessment methodologies using tools like MobSF and Frida.

Featured Projects

WiFi Penetration Testing Kit

NodeMCU ESP8266-based wireless security testing toolkit for WiFi network assessment, captive portal creation, and wireless attack simulation. Features automated deauth attacks and evil twin AP deployment.

NodeMCU ESP8266 WiFi Security Arduino IDE Wireless Hacking Red Team

BadUSB Attack Platform

Raspberry Pi Zero W configured as a USB HID device for automated payload delivery, keystroke injection, and physical security testing. Custom scripts for Windows/Linux exploitation and data exfiltration.

Raspberry Pi Zero W USB HID Physical Security Python Payload Injection

RF Car Key Security Testing

M5StickC Plus2 with CC1101 module for automotive RF security assessment. Tools for analyzing, recording, and replaying car key fob signals for authorized vehicle security testing and research.

M5StickC Plus2 CC1101 Module RF Security Automotive Signal Analysis

RFID Access Card Cloning Tool

M5StickC Plus2 with RFID module for proximity card security assessment. Capability to read, clone, and emulate various RFID/NFC access cards for authorized physical security testing.

M5StickC Plus2 RFID Module NFC Security Access Control Physical Security

BLE Penetration & Jamming Kit

M5StickC Plus2 with NRF24L01 module for Bluetooth Low Energy security testing. Features BLE device enumeration, packet sniffing, jamming capabilities, and connection hijacking for IoT security assessment.

M5StickC Plus2 NRF24L01 Module BLE Security IoT Testing Signal Jamming

Custom Evil Portal Collection

Legacy collection of realistic captive portal pages mimicking Google and Microsoft login interfaces. Flask-based applications with advanced phishing techniques for authorized social engineering assessments.

Flask Python HTML/CSS Social Engineering Phishing

More innovative security projects coming soon...

Latest Security Blog & Writeups

WiFi Hacking with NodeMCU ESP8266: Complete Guide

Comprehensive guide to building a WiFi penetration testing toolkit using NodeMCU ESP8266. Covers deauth attacks, evil twin setup, captive portal deployment, and wireless reconnaissance techniques for authorized testing.

Read More

BadUSB Attacks with Raspberry Pi Zero W: USB HID Exploitation

Step-by-step tutorial on creating a BadUSB device using Raspberry Pi Zero W for keystroke injection attacks. Includes payload development, HID configuration, and advanced persistence techniques for red team operations.

Read More

RF Car Key Hacking: M5StickC Plus2 + CC1101 Module Analysis

Deep dive into automotive RF security testing using M5StickC Plus2 and CC1101. Learn signal analysis, recording/replay attacks, and frequency hopping techniques for authorized vehicle security assessments.

Read More

Educational Resources & Tools(Coming soon)

Professional Resume

Download my latest cybersecurity professional resume with detailed experience in penetration testing, red team operations, and security research.

Download Resume

Achievements & Certifications

Professional Certifications

PT1 - TryHackMe Certified Penetration Tester

TryHackMe - Hands-on penetration testing certification covering Web Application, Network, and Active Directory security assessments with professional reporting

eJPT - eLearnSecurity Certified Penetration Tester

INE Security - Entry-level penetration testing certification focusing on practical exploitation techniques, network security, and vulnerability assessment methodologies

CNSP - Certified Network Security Practitioner

SecOps Group - Network security certification covering advanced network defense strategies, incident response, and security operations center practices

Multiple Side Certifications

Various industry certifications in cybersecurity fundamentals, ethical hacking methodologies, and specialized security tools and techniques from recognized training providers

Currently Preparing

CRTP & OSCP - Advanced certifications: Certified Red Team Professional for Active Directory exploitation and Offensive Security Certified Professional for advanced penetration testing

Professional Achievements

TryHackMe Top 3% Global Ranking

Currently ranked in the top 3% of users globally on TryHackMe platform, demonstrating consistent excellence in cybersecurity challenges and penetration testing scenarios

Top 10 Hall of Fame Recognition

Achieved top 10 hall of fame status and recognition by multiple organizations listed on Bugcrowd platform for responsible vulnerability disclosure and ethical security research

100% Client Satisfaction & Appreciation

Maintained perfect client satisfaction rating across all penetration testing engagements at Secure Logic, earning consistent appreciation and repeat business from clients

Multiple Vendor Vulnerability Discoveries

Successfully discovered and reported multiple critical vulnerabilities in vendor systems during authorized client penetration testing engagements, contributing to improved security posture

Advanced Malware Analysis

Analyzed numerous malware samples to determine their nature, intent, and post-execution behavior, contributing to threat intelligence and incident response capabilities

Professional Security Consulting

Extensive experience in client-facing security consulting, delivering comprehensive penetration testing services and actionable security recommendations for enterprise clients

Get In Touch

Interested in cybersecurity consulting, penetration testing, or security research collaboration? Let's connect and discuss how we can strengthen your security posture.

Available for penetration testing engagements and security consulting

© 2025 Prathamesh Khanvilkar - Cybersecurity Professional. All rights reserved.

Built with passion for cybersecurity | All tools and resources for educational purposes only