Skip to content
View vedantpatil02's full-sized avatar

Block or report vedantpatil02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vedantpatil02/README.md
<div align="center">

<img src="https://readme-typing-svg.herokuapp.com?font=Fira+Code&size=32&duration=3000&pause=1000&color=00FF66&center=true&vCenter=true&width=1000&lines=VEDANT+PATIL;OFFENSIVE+SECURITY+RESEARCHER;WEB+APPLICATION+PENTESTER;CEH+v13+CERTIFIED;CIPHERVEIL" />

</div>

---

<div align="center">

# ⚡ OFFENSIVE SECURITY | PENETRATION TESTING | VAPT ⚡

</div>

```bash
root@cipherveil:~# status

[+] CEH v13 Certified
[+] Security Analyst
[+] Web Application Pentester
[+] Offensive Security Researcher
[+] Cybersecurity Content Creator

👨‍💻 About Me

I am a CEH v13 certified penetration tester with hands-on experience in:

  • Web Application Pentesting
  • Network Vulnerability Assessment
  • OWASP Top 10 Testing
  • Phishing Awareness Simulations
  • Offensive Security Research
  • Security Monitoring & Analysis

I actively practice through:

  • PortSwigger Web Security Academy
  • TryHackMe
  • OverTheWire

I also create cybersecurity walkthroughs and offensive security content on CipherVeil.


⚔️ Offensive Security Skills

Web Security Network Security Offensive Security Security Operations
XSS Testing Network VAPT Reconnaissance IBM QRadar
SQL Injection Nessus Scanning Enumeration Log360
IDOR Testing Service Discovery Privilege Escalation Event Analysis
Authentication Testing Misconfiguration Analysis Exploitation Monitoring
OWASP Top 10 Port Analysis Payload Testing Detection Logic

🛠️ Tools & Technologies

Burp Suite Nmap Metasploit Kali Linux SQLMap Nessus Wireshark GoPhish Postman


💼 Professional Experience

🔹 Security Analyst — Nio Stars Technologies

📍 Pune 📅 May 2025 – Present

Responsibilities

[+] Web Application Vulnerability Assessment
[+] Manual Testing using Burp Suite
[+] OWASP Top 10 Testing
[+] Network Vulnerability Assessment using Nmap & Nessus
[+] VAPT Report Preparation
[+] SIEM Monitoring & Event Analysis
[+] Security Misconfiguration Analysis

Vulnerabilities Worked On

  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Insecure Direct Object References (IDOR)
  • Authentication & Authorization Flaws
  • Input Validation Issues

🔬 Projects

🌐 PortSwigger Web Security Academy

[+] SQL Injection Labs
[+] XSS Labs
[+] CSRF Labs
[+] Authentication Vulnerabilities
[+] Business Logic Vulnerabilities
[+] IDOR Vulnerabilities

🧠 TryHackMe & OverTheWire

[+] Linux Privilege Escalation
[+] Enumeration
[+] Exploitation
[+] Post-Exploitation
[+] Recon Workflows

📡 Network Vulnerability Assessment

> Service Enumeration using Nmap
> Vulnerability Assessment using Nessus
> Security Misconfiguration Analysis
> Risk Validation & Reporting

🎣 GoPhish Awareness Simulation

[+] Security Awareness Campaigns
[+] Credential Capture Simulation
[+] Reporting & Metrics
[+] Email Template Testing
[+] User Awareness Measurement

📺 CipherVeil — Cybersecurity Content

🎥 Offensive Security Walkthroughs & Cybersecurity Content

Topics Covered

> PortSwigger Walkthroughs
> Web Exploitation
> Burp Suite Usage
> Pentesting Methodologies
> Vulnerability Assessments
> Offensive Security Concepts

🔗 YouTube Channel 👉 https://www.youtube.com/@CipherVeilSec


📜 Certifications

  • ✅ CEH v13 — EC-Council
  • ✅ CCNA — Networking Fundamentals
  • ✅ Basics of Ethical Hacking

📡 Connect With Me

LinkedIn

GitHub

YouTube


⚡ Current Focus

[*] Advanced Web Exploitation
[*] Offensive Security Research
[*] Red Team Methodologies
[*] Real-world Pentesting Workflows
[*] Security Content Creation

root@cipherveil:~# echo "Think like an attacker. Defend like a professional."
```

Pinned Loading

  1. My_Projects My_Projects Public

    Java