Available for internships & opportunities

Chanukya
Chintada

Cybersecurity Student —

Passionate about defending digital infrastructure. I build security tooling, hunt threats, and break systems ethically to make them stronger.

15+Projects
8+Certifications
50+CTF Solves

Who I Am

I'm a cybersecurity student with a deep interest in offensive and defensive security. My focus areas span SOC operations, threat detection, network forensics and ethical hacking.

I thrive in Capture-the-Flag competitions, use hands-on home labs to replicate real-world attacks, and love building Python tooling to automate security tasks.

When I'm not deciphering packet captures or writing SIEM rules, I'm contributing to open-source security projects and reading threat intelligence reports.

Focus Areas

  • SOC Operations & Threat Hunting
  • Penetration Testing
  • Network Forensics & Packet Analysis
  • Security Automation (Python)

Tools & Platforms

  • Kali Linux · Metasploit · Burp Suite
  • Wireshark · Nmap · OWASP ZAP
  • Splunk · Elastic SIEM · Wazuh
  • TryHackMe · HackTheBox

Technical Skills

Network Security

Network Analysis
Firewall & IDS/IPS
VPN & Zero Trust

Penetration Testing

Web App Testing (OWASP)
Exploitation & Post-Exploit
Reconnaissance

SOC & Threat Intel

SIEM (Splunk / Elastic)
Incident Response
Threat Hunting & IOC

Programming

Python (Security Scripts)
Bash / Shell Scripting
C / Assembly (reversing)
Kali Linux Metasploit Burp Suite Wireshark Nmap Splunk Wazuh OWASP ZAP John the Ripper Hashcat Volatility Ghidra Docker Linux AWS Security MITRE ATT&CK

Featured Projects

Defensive Security

Phish Guard – Browser Security Extension

Real-time phishing URL detection, suspicious file download alerts, and user-controlled stop/continue protection with activity logging for auditing.

  • JavaScript
  • Chrome Extension API
  • Browser Security
Offensive Security

Disk Alert System

Automated disk usage monitoring with threshold-based alert triggering, cron job integration, and email/log-based system tracking.

  • Bash Scripting
  • RHEL
  • Cron
  • Automation
Blue Team

Password Expiry Notifier

Automated password aging checks with advance expiry notifications and policy compliance monitoring using Linux security tools like `chage`.

  • Bash Scripting
  • Linux
  • IAM
  • Security Auditing
CTF / Research

Zombie Process Detector

Detects zombie (Z-state) processes, identifies parent-child PID relationships, and generates system health logs.

  • Bash Scripting
  • System Administration
  • Process Management
  • Linux
Tooling

Old File Archiver

Detects files older than defined threshold, automatically archives and compresses them (tar/gzip), with an optional source cleanup.

  • Bash Scripting
  • Data Management
  • Linux Storage
  • Compression
Red Team

User Session Logger

Tracks login and logout sessions, monitors active users on the system, and generates audit trail logs for security monitoring.

  • Bash Scripting
  • System Auditing
  • Linux
  • Security

Certifications & Training

RHCSA Summer Training — Mastering Linux System Administration

LPU + Red Hat

Earned

Red Hat System Administration I (RH124)

Red Hat

Earned

Red Hat System Administration II (RH134)

Red Hat

Active

Cloud Computing

NPTEL

Earned

Cyber Security Associate Certification Programme

Reliance Foundation

In Progress

The Bits and Bytes of Computer Networking

Google / Coursera

Earned

Achievements & Recognition

1

Published Book Chapter – Springer (2025)

“Cybersecurity and Computational Intelligence: Protecting the Digital World”
Included in: Next-Generation Computational Intelligence: Trends and Technologies
DOI: 10.1007/978-3-031-96871-6_11

Publication
5

Linux Security Automation Projects

Completed Disk Alert, Archiver, Password Expiry Notifier, Zombie Detector, and User Session Logger. Successfully structured and evaluated.

Development
1

SQL Injection Security Lab

DVWA on Kali Linux: Environment setup, vulnerability exploitation, and mitigation techniques in a fully documented GitHub project.

Practical
1

Security-Focused Chrome Extension

Developed Phish Guard browser extension from concept to architecture, implementation, and UI deployment.

Innovation

Education

2022 – 2026 Current

B.Tech — Computer Science & Engineering

Lovely Professional University

Specialisation: Cybersecurity

Pursuing a four-year undergraduate degree with focus on network security, cryptography, and ethical hacking. Active member of the university cybersecurity club.

Network SecurityCryptographyEthical HackingOS InternalsDigital ForensicsCloud Security
2020 – 2022 Completed

Higher Secondary — Science (MPC)

Sri Chaitanya Junior College

Specialisation: Mathematics, Physics & Computer Science

Completed senior secondary with distinction. Developed foundational interest in computer networks and security through self-study and online communities.

MathematicsPhysicsComputer Science

Cybersecurity Insights

Threat analysis, writeups & field notes from the frontlines of cyber defence.

CTF Writeup

PicoCTF 2024 — Reverse Engineering Challenge Walkthrough

Step-by-step breakdown of a multi-stage binary challenge using Ghidra and GDB, from static analysis to dynamic exploitation.

Read More →
Threat Intel

Understanding Living-off-the-Land (LotL) Attack Techniques

How adversaries abuse legitimate system binaries like PowerShell and WMI to evade endpoint detection and blend into normal traffic.

Read More →
Blue Team

Building a Home SIEM Lab with Elastic Stack in Under an Hour

A practical guide to deploying Elasticsearch, Logstash, Kibana, and Filebeat on a single VM to monitor your home network.

Read More →
Ethical Hacking

Recon with OSINT: Mapping an Attack Surface Before You Touch a Port

Passive recon using Shodan, theHarvester, and public registries to build a full target picture without triggering any alerts.

Read More →

Get In Touch

I'm actively seeking cybersecurity internships, SOC analyst roles, and research collaborations. Feel free to reach out about opportunities or just to talk security.