@amalpk
Cyber Security Researcher | Security Analyst | VAPT | CTF Player | CEH v12
I'm a Security Analyst in cybersecurity, focused on keeping applications safe and identifying vulnerabilities. I specialize in application security, analyze and fortify systems against threats, and communicate effectively in fast-paced environments. I've excelled in CTF challenges, showcasing my ability to tackle complex security issues, and I'm committed to continuous learning and innovation in the field.
I am available for freelance projects, security consultations, penetration testing, CTF collaborations, and speaking engagements or workshops related to cybersecurity.
May 8 · 4 min read · Setting up Burp Suite with Android devices or emulators can be annoying, especially on newer Android versions where user-installed certificates are not trusted by many apps by default. There are many
Join discussion
Nov 11, 2025 · 8 min read · We use dependencies in our code like we use electricity in our homes—quietly, constantly, and without thinking twice. Whether you’re building a backend service in Go, wiring up a React frontend, or automating something with Python, you’re almost cert...
Join discussion
Jul 7, 2025 · 4 min read · Caption is a Hard-difficulty Linux box, showcasing the chaining of niche vulnerabilities arising from different technologies such as HAProxy and Varnish. It begins with default credentials granting access to GitBucket, which exposes credentials for a...
Join discussion
Jul 7, 2025 · 11 min read · Cicada is an easy-difficult Windows machine that focuses on beginner Active Directory enumeration and exploitation. In this machine, players will enumerate the domain, identify users, navigate shares, uncover plaintext passwords stored in files, exec...
Join discussion