<div align="center">
<img src="https://readme-typing-svg.herokuapp.com?font=Fira+Code&size=32&duration=3000&pause=1000&color=00FF66¢er=true&vCenter=true&width=1000&lines=VEDANT+PATIL;OFFENSIVE+SECURITY+RESEARCHER;WEB+APPLICATION+PENTESTER;CEH+v13+CERTIFIED;CIPHERVEIL" />
</div>
---
<div align="center">
# ⚡ OFFENSIVE SECURITY | PENETRATION TESTING | VAPT ⚡
</div>
```bash
root@cipherveil:~# status
[+] CEH v13 Certified
[+] Security Analyst
[+] Web Application Pentester
[+] Offensive Security Researcher
[+] Cybersecurity Content CreatorI am a CEH v13 certified penetration tester with hands-on experience in:
- Web Application Pentesting
- Network Vulnerability Assessment
- OWASP Top 10 Testing
- Phishing Awareness Simulations
- Offensive Security Research
- Security Monitoring & Analysis
I actively practice through:
- PortSwigger Web Security Academy
- TryHackMe
- OverTheWire
I also create cybersecurity walkthroughs and offensive security content on CipherVeil.
| Web Security | Network Security | Offensive Security | Security Operations |
|---|---|---|---|
| XSS Testing | Network VAPT | Reconnaissance | IBM QRadar |
| SQL Injection | Nessus Scanning | Enumeration | Log360 |
| IDOR Testing | Service Discovery | Privilege Escalation | Event Analysis |
| Authentication Testing | Misconfiguration Analysis | Exploitation | Monitoring |
| OWASP Top 10 | Port Analysis | Payload Testing | Detection Logic |
📍 Pune 📅 May 2025 – Present
[+] Web Application Vulnerability Assessment
[+] Manual Testing using Burp Suite
[+] OWASP Top 10 Testing
[+] Network Vulnerability Assessment using Nmap & Nessus
[+] VAPT Report Preparation
[+] SIEM Monitoring & Event Analysis
[+] Security Misconfiguration Analysis- Cross-Site Scripting (XSS)
- SQL Injection (SQLi)
- Insecure Direct Object References (IDOR)
- Authentication & Authorization Flaws
- Input Validation Issues
[+] SQL Injection Labs
[+] XSS Labs
[+] CSRF Labs
[+] Authentication Vulnerabilities
[+] Business Logic Vulnerabilities
[+] IDOR Vulnerabilities[+] Linux Privilege Escalation
[+] Enumeration
[+] Exploitation
[+] Post-Exploitation
[+] Recon Workflows> Service Enumeration using Nmap
> Vulnerability Assessment using Nessus
> Security Misconfiguration Analysis
> Risk Validation & Reporting[+] Security Awareness Campaigns
[+] Credential Capture Simulation
[+] Reporting & Metrics
[+] Email Template Testing
[+] User Awareness Measurement> PortSwigger Walkthroughs
> Web Exploitation
> Burp Suite Usage
> Pentesting Methodologies
> Vulnerability Assessments
> Offensive Security Concepts🔗 YouTube Channel 👉 https://www.youtube.com/@CipherVeilSec
- ✅ CEH v13 — EC-Council
- ✅ CCNA — Networking Fundamentals
- ✅ Basics of Ethical Hacking
[*] Advanced Web Exploitation
[*] Offensive Security Research
[*] Red Team Methodologies
[*] Real-world Pentesting Workflows
[*] Security Content Creation```