// TACTICAL OPERATIONS SYSTEM v4.2
// LOADING OPERATOR FILE...
// CLEARANCE LEVEL: AUTHORIZED
// DECRYPTING PERSONNEL DATA...
// ACCESS GRANTED — WELCOME, COMMANDER
PORTFOLIO
XPLOIT OPS
Classified — Operator File

AnubhavRajput

Cybersecurity Specialist · Ethical Hacker · Builder

Cybersecurity student with strong foundations in coding, penetration testing, and AI-based security. Experienced in building custom tools and solving technical challenges. Passionate about ethical hacking, vulnerability assessment, and innovative security solutions.

AR
CODENAMEXPLOIT
STATUSACTIVE
BASENew Delhi, IN
UNITIILM University
SPECIALITYPen Testing / AI Sec
HACKATHONS3× Team Lead
CLEARANCEAUTHORIZED
01
// Intel Dossier
Skills & Arsenal
// Primary Weapon
Cybersecurity
// Tactical Tool
Penetration Testing
// Language
Python
// Language
C / C++
// AI Ops
Gen AI & Prompt Eng.
// Infrastructure
Networking
// Data Layer
Database Management
// Language
Java / OOPs
02
// Mission Logs
Projects
01
DEPLOYED
XPLOIT — Web Vulnerability Tool
// Nmap · BeautifulSoup · Private DNS · Port Scanner · IP Tracing
+
// Mission Brief
Built a full web-based vulnerability assessment tool from scratch. Integrated a private DNS server for stealth recon, Nmap for port scanning and IP tracing, and BeautifulSoup for web scraping target surfaces. Designed for ethical penetration testing in controlled environments.
02
DEPLOYED
E-SARTHI — Hospital OPD System
// SQL · GoQR · Google Maps API · QR Management
+
// Mission Brief
Engineered an OPD availability system for Government Hospitals featuring QR-based entry management, real-time location tracking, and Google Maps integration to surface the nearest hospital with available specialists.
03
DEPLOYED
Dark Pattern Identifier
// Selenium · Web Scraping · Screen Capture · User Identification
+
// Mission Brief
Developed an application to automatically detect dark patterns in e-commerce websites. Uses Selenium for browser automation, DOM analysis, and screen capture to visually flag deceptive UI. Winner qualifier at Dark Pattern Busters Hackathon 2023.
03
// Field Operations
Open Source Intel
COMPLETED
// FILE-001 · OPEN SOURCE
WerWolv / ImHex
  • Hex Editor for Reverse Engineering
  • Static Analysis of 8+ Web Browser Applications
  • Binary Analysis & pattern language recognition
  • Data Driven Forensics investigations
COMPLETED
// FILE-002 · OPEN SOURCE
Lissy93 / Personal Security Checklist
  • Provided AI-based security tips for personal threat optimization
  • Compiled 25+ curated tips from 300+ entries
  • Focused on practical threat mitigation for everyday users
04
// Commendations
Awards & Hackathons
🥇
Smart India Hackathon 2024
Regional Round Qualifier
Team Lead — Beat 225 Teams
🥇
Smart India Hackathon 2024
Regional Round Qualifier
Team Lead — Beat 135 Teams
🏆
Dark Pattern Busters 2023
Nodal Centre Qualifier
Team Lead — Beat 35 Teams
🥇
Athletics — Delhi State
Taekwondo Sub Jr.
Gold Medal — State Champion
🥇
Athletics — Zonal Level
Basketball Sub Jr.
1st Position — Gold Medal
🥈
Athletics — Zonal Level
Basketball Jr.
1st Runner Up — Silver
🥉
Athletics — Zonal Level
Basketball Sr.
3rd Position — Bronze
05
// Training & Clearance
Education
🎓
// Current Deployment
IILM University, Greater Noida
B.Tech Computer Science Engineering
ACTIVE
🏫
// Prior Training
Maxfort School, Dwarka, New Delhi
Higher Secondary Education
COMPLETE
📚
// Foundation
Maxfort School, Dwarka, New Delhi
Secondary Education
COMPLETE
Request Extraction
// OPEN TO INTERNSHIPS · PROJECTS · COLLABORATIONS
// NEW DELHI · INDIA · 2025
ALL INTEL CLASSIFIED
CLASSIFIED -- OPERATOR PLATFORM
XPLOIT
DASHBOARD
WEB VULNERABILITY TESTING PLATFORM
// TOTAL SCANS
0
ALL TIME
// VULNERABILITIES
0
DETECTED
// OPEN PORTS
0
DISCOVERED
// CTF SCORE
0
PTS EARNED
QUICK SCAN
// START A VULNERABILITY SCAN ON A TARGET URL
🛡️
FIND COMMON WEB VULNERABILITIES
🔌
DISCOVER OPEN PORTS ON TARGET
🗄️
VIEW PREVIOUS SCAN RESULTS
// RECENT ACTIVITY
+ NEW SCAN
// NO RECENT SCANS FOUND
ACTIVE -- SCAN ENGINE
SCANNER
RUN VULNERABILITY AND PORT SCANS ON TARGETS
XPLOIT // SCAN OUTPUT
// XPLOIT scanner ready. // Enter a target and click LAUNCH SCAN to begin.
// OPEN PORTS0
// Run scan first
// VULNERABILITIES0
// Run scan first
THREAT ASSESSMENT -- ALL TARGETS
VULNERABILITIES
ALL DETECTED VULNERABILITIES ACROSS SCANS
// NO VULNERABILITIES DETECTED YET. RUN A SCAN FIRST.
RECON -- PORT DISCOVERY
PORT SCAN
DISCOVER OPEN PORTS AND RUNNING SERVICES
// PORT RESULTS
0 PORTS FOUND
PORTSTATESERVICEVERSION
// RUN A SCAN TO SEE PORT RESULTS
// STATS
TOTAL0
OPEN0
CLOSED0
OS--
ARCHIVE -- SCAN HISTORY
DATABASE
PREVIOUS SCAN RESULTS ARCHIVE
// SCAN RECORDS
0 RECORDS
// NO SCAN RECORDS. RUN A SCAN TO POPULATE THE DATABASE.
SIMULATION -- ETHICAL HACKING LAB
CTF LAB
XPLOIT ENGINE ACTIVE -- PRACTICE ENVIRONMENT
// CHALLENGES
0 / 3
TARGET-ALPHA
Exposed Apache server with outdated modules. Find the hidden admin endpoint.
EASY100 PTS
SHADOW-NODE
Misconfigured SSH daemon and exposed databases. Find the vulnerability chain.
MEDIUM250 PTS
GHOST-WEB
E-commerce platform riddled with XSS and SQL injection vectors.
HARD500 PTS
// SESSION
SCORE0
FLAGS0/3
VULNS0
TARGET--
// INTEL HINT
// SELECT A CHALLENGE TO REVEAL CLASSIFIED INTEL.
XPLOIT // CTF SIMULATION
// XPLOIT CTF Lab -- simulation environment loaded. // Select a challenge and click LAUNCH XPLOIT to begin.
// SUBMIT FLAG
// TERMINAL COMMAND
operator@xploit:~$
DIRECT -- COMMAND INTERFACE
CONSOLE
XPLOIT OPERATOR TERMINAL
// Xploit Console v1.0.0 -- type 'help' for available commands // Operator: Anubhav Rajput | Codename: XPLOIT | New Delhi, IN
operator@xploit:~$