Manoj Kumar
Cybersecurity Professional • Penetration Tester • Security Analyst
Defending the Digital Frontier
About Me
Cybersecurity with a Purpose
Hello! My name is Manoj Kumar, a Cybersecurity professional with a deep passion for protecting both digital infrastructures and industrial environments. My journey blends a hacker's mindset with a defender's discipline.
I specialize in penetration testing, digital forensics, cybersecurity Instructor , and network security. Armed with certifications like CEH, WAPT, NPT, CCNA, and Python, I've engaged in everything from real-world cyberattacks to academic research and competitive hacking.
Notably, I've been recognized by the Government of India for disclosing critical vulnerabilities, featured in Inflectra's Hall of Fame, and celebrated as a 3× CTF champion and Hackathon finalist at IISc.
I also enjoy sharing knowledge — whether through public speaking, running workshops, or contributing tools like my custom network mapper PortXplorer.
If you're looking for someone who thrives on solving complex security challenges and making real-world impact — let's connect.
Services
Penetration Testing
I perform professional penetration testing to identify loopholes in the organization's infrastructure.
Vulnerability Assessment
Identifying early and malicious security flaws in the infrastructure.
Network Setup
Designing and implementing secure and efficient network infrastructure for organizations.
Security Tool Development
Building custom tools for scanning, monitoring, and automation — like my project PortXplorer.
Corporate Security Awareness Training
Empowering teams with hands-on workshops to recognize phishing, secure credentials, and respond to threats.
Digital Forensics
Recovering evidence and tracing cyber incidents through forensic investigation and malware analysis.
Experience
2025
Resource Person - coorg institute of technology(C.I.T)
Delivered hands-on training on ethical hacking and Web application Security to 35+ students. Designed labs covering key concepts of cybersecurity, tools and techniques.
2025
Resource Person - Akash Institute of Engineering and Technology
Delivered hands-on training on ethical hacking and network security to 20+ students. Designed labs covering key cybersecurity tools and techniques.
Sep 2024 – Dec 2024
Cybersecurity Intern - Supraja Technology
Conducted vulnerability assessments and penetration tests. Documented findings and suggested mitigations.
Sep 2022 – Present
Freelance Bug Bounty Hunter
Disclosed vulnerabilities to platforms. Featured in Hall of Fame and received appreciation from the Indian government.
Works & Projects
Freelance Cybersecurity Resource Person
I’ve been invited as a Cybersecurity Resource Person by multiple engineering colleges to deliver hands-on sessions, workshops, and technical demonstrations on ethical hacking, network security, and red-team operations.
Digital Forensics Investigation
Led forensic analysis on compromised systems. Recovered deleted files, analyzed logs, and traced threat actor behavior to produce court-admissible reports and mitigation plans.
IDOR Security Testing Lab Tool
A hands-on lab environment to practice Insecure Direct Object Reference (IDOR) attacks with real scenarios, guided solutions, and security explanations.
🔗 View ProjectFlagSniff (CLI Tool)
A command-line tool that analyzes .pcap files and automatically extracts flags, credentials, tokens, and CTF artifacts using pattern matching.
🔗 View ProjectOWASP Top-10 LabX (CLI Tool)
An interactive lab platform demonstrating all OWASP Top-10 vulnerabilities with real-world examples, exploitation steps, and detailed learning modules.
🔗 View ProjectOSINT Image Analyzer (CLI Tool)
A simple OSINT tool that extracts metadata, hidden information, GPS data, and analysis details from image files for investigation and research.
🔗 View ProjectPortXplorer - Network Mapping Tool
Developed a Python-based port and service scanner with GUI for network inventory tracking. Integrated real-time visualization of discovered hosts and services with vulnerability lookup capabilities.
🔗 View ProjectRed Team Toy - Offensive Security Toolkit 🔗
A web-based offensive security toolkit for Red Teamers and Pentesters. Includes payload generators, encoding/decoding utilities, and reconnaissance tools. Built with HTML, CSS, and JavaScript, deployed via Vercel.
🔗 View ProjectFeedbacks
Certifications
Certified Ethical Hacker (CEH)
Professional Certification
Comprehensive ethical hacking and penetration testing certification covering advanced attack vectors and defense mechanisms.
Web Application Penetration Testing (WAPT)
Professional Certification
Specialized in identifying and exploiting web application vulnerabilities using industry-standard methodologies.
Network Penetration Testing (NPT)
Professional Certification
Advanced network security assessment and penetration testing techniques for enterprise environments.
Cisco Certified Network Associate (CCNA)
Professional Certification
Comprehensive networking fundamentals, routing, switching, and network security protocols.
Python Programming
Professional Certification
Advanced Python programming for cybersecurity automation, scripting, and security tool development.
B.E. Cybersecurity
Final Year Student
Comprehensive cybersecurity education covering digital forensics, OT security, and advanced threat analysis.
Hall of Fame
Recognition for responsible vulnerability disclosure and cybersecurity contributions
Government of India Recognition
Critical Vulnerability Disclosure
Officially recognized by the Government of India for responsibly disclosing critical security vulnerabilities in government systems.
Inflectra Hall of Fame
Security Research
Featured in Inflectra's Hall of Fame for discovering and reporting security vulnerabilities in their software products.
3× CTF Champion
Capture The Flag Competitions
Three-time champion in various Capture The Flag cybersecurity competitions, demonstrating advanced penetration testing and problem-solving skills.
IISc Hackathon Finalist
Innovation Competition
Reached finals at the prestigious Indian Institute of Science (IISc) hackathon, competing against top talent in cybersecurity innovation.
Bug Bounty Hunter
Vulnerability Research
Active bug bounty hunter since 2022, with multiple successful vulnerability disclosures across various platforms and organizations.
Security Research Contributor
Community Contribution
Actively contributing to the cybersecurity community through research, tool development, and knowledge sharing, with hands-on experience in VAPT, red teaming, penetration testing, and various security domains
Blog
Coming soon: insights and articles on cybersecurity topics and case studies.