Skip to content
View chetanngavali's full-sized avatar
πŸ’­
working on project
πŸ’­
working on project

Sponsors

@rootqubit-webes

Block or report chetanngavali

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
chetanngavali/README.md

Typing SVG


πŸ›‘οΈ EXECUTIVE TERMINAL

My mission is to deconstruct complex threat vectors and architect digital fortresses that are secure by design, horizontally scalable, and natively defended.

LOCATION: India | FOCUS: Web Security // IoT // Zero-Trust | STATUS: Seeking Internships


⚑ CORE SPECIALIZATIONS

Advanced Pentesting Scalable Systems Secure Firmware Dev
VAPT / Threat Modeling Cloud-Native Solutions Edge Intelligence
OWASP Security Audit Secure Microservices Protocol Engineering

πŸ›‘οΈ OPERATIONAL INTELLIGENCE (LABS)

🏠 Home Lab V2.0

Dedicated AD environment with Windows Server 2022. Practicing lateral movement, privilege escalation, and SIEM monitoring.

🌐 IoT Sandbox

Secure mesh network of ESP32 nodes. Testing MITM resilience and encrypted protocol stability across edge devices.


πŸŽ“ PROFESSIONAL DEVELOPMENT

  • 🎯 Target Path: Actively preparing for eJPT (Junior Penetration Tester) and OSCP certifications.
  • πŸ† Current Learning: Advanced Web Hacking, Network Pivoting, and Malware Analysis.

πŸ› οΈ SYSTEM ARSENAL

CATEGORY TECHNOLOGIES
LANGUAGES
FRONTEND
BACKEND
SECURITY/OPS

πŸ’Ή REAL-TIME TELEMETRY


πŸ“‘ NETWORK NODE

LinkedIn Email Twitter


ACCESS_STATUS: GRANTED | ENCRYPTION: ACTIVE | INTERESTS: INTERNSHIPS // COLLABS // CTFs


Open to security internships, collaborations on offensive tooling, and CTF teams – reach out via LinkedIn or Email.


Built with 🀍 by Chetan Gavali

Pinned Loading

  1. EVIL_TWINS_ESP8266 EVIL_TWINS_ESP8266 Public template

    Evil Twin ESP8266 is a state-of-the-art, feature-rich penetration testing tool designed for the ESP8266 platform. It allows security researchers to simulate an "Evil Twin" attack to audit the secur…

    2

  2. chetanngavali chetanngavali Public

    Hi there, I'm Chetan Gavali πŸ‘‹ 2nd Year B.Tech Computer Engineering Student at K. K. Wagh Institude Of Engineering College. πŸ’» Front End Developer | Passionate about Ethical Hacking. πŸš€ Always eager t…

    1

  3. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python 2