Sooraj Balasubramaniyan
Cybersecurity researcher focused on penetration testing, adversary simulation, Linux security, and practical vulnerability research.
Scroll to revealCybersecurity researcher focused on penetration testing, adversary simulation, Linux security, and practical vulnerability research.
Scroll to revealSelf-taught cybersecurity researcher from Kerala, India, with hands-on focus in web exploitation, offensive workflows, and vulnerability validation across real-world targets.
4+ years of SaaS support and implementation exposure in enterprise environments, now converted into offensive context for risk discovery and practical hardening guidance.
Built and published GarudaDebloat, a Windows debloating and hardening utility focused on streamlining privacy, performance, and baseline security setup workflows.
Designed and published a beginner-level Linux forensics challenge with custom scenario logic, guided documentation, and investigative workflow checkpoints.
Active testing on production programs for access control flaws, API weaknesses, and data exposure vectors with reproducible proof-of-concept reporting.
Performed imaging, triage, malware verification, controlled recovery, and post-incident procedure delivery for compromised endpoint data sets.
Executed full chains involving SSRF, shell access, escalation, credential attacks, and post-exploitation validation across Linux-focused labs.
Penetration Testing, Vulnerability Assessment, Web App Security, Privilege Escalation, AD Attack Fundamentals, OSINT.
Burp Suite, Nmap, Wireshark, Nessus, Metasploit, Wazuh, ClamAV, Kali Linux, ProjectDiscovery stack.
Python, Bash, PHP, C for automation, payload adaptation, and proof-of-concept support scripts.
Linux and Windows administration, networking, virtualization, Git workflows, and operational documentation.
Practical Network Penetration Tester, TCM Security (In Progress).
TCM Security (2022).
Learn Hacking Through Programming, Selfmade Ninja Academy (2024).
IBM on Coursera (2024).
Available for cybersecurity roles, security research collaboration, and offensive security projects.
soorajcodes@gmail.com