Security researcher focused on vulnerability assessment, exploit reproduction, and ML-driven intrusion detection. I like turning noisy telemetry into reliable, real-time detection.
- Offense-informed defense: reproduce exploits → codify detections → measure impact
- IDS/IPS, network forensics, and security automation with Python/Go
- Shipping practical tools over academic toys
🛡️ Intelligent Intrusion Detection System (IDS)
Code
ML-based, real-time packet capture & protocol analysis (TCP/UDP/HTTP). Benchmarked for latency, throughput, and false positives.
Network Security,ML,Scapy,Real-time
🔎 Automated Vulnerability Assessment Toolkit
Code
Concurrent TCP scanning, banner ID, heuristic vuln detection; emits HTML/JSON reports for triage.
Recon,Automation,Reporting
⌨️ Keylogger (Educational PoC)
Code
Awareness demo used to teach detection & prevention techniques.
Security Awareness,Monitoring
⚓ Smart DSS — Cybersecurity Risk in Ports
Code
Rule-based + ML anomaly scoring for vendor/third-party risk in maritime/port environments.
Risk,Anomaly Detection,Decision Support
…and more 🗂️ explore my projects.
- 🧰 Exploit Repro — turning CVEs into detections & mitigations
- 🔎 Packet Stories — short Wireshark/Scapy deep-dives
- 📓 TTP Notes — ATT&CK techniques with practical detection rules
(Publishing public write-ups soon.)
- Google Cybersecurity
- EC-Council: Digital Forensics for Pentesters
- FEMA NIMS ICS-100
- Incident Response Planning & Management
- Suricata rule tuning & performance profiling
- Go for high-performance network tooling
- Streamlining DFIR playbooks with automation
📍 Karlskrona, Sweden ✉️ ntvsagar@gmail.com 💼 linkedin.com/in/varshithsagar