I'm Pushpender Singh Rathore
Cybersecurity Analyst
I'm Pushpender, Second-year B.Tech CSE student at BRCM CET. I build Advanced tools, Exploring CyberSecurity, and Writing Code in C/C++ , assembly and Python. I enjoy problem solving by Breaking Systems under isolated labs (legally). Experienced in Malware & Botnet analysis With tools Ghidra, gdb, YARA, xxd, objectjumb, BinaryNinja and Machine Learning using Transformers, Pytorch, TensorFlow, Numpy, Ollama, Scikit-learn, panda Modules and high-level Keras API. creating efficient Daemons, and exploring IOT/system-level concepts that help in Offensive security research and ethical hacking.
Experience
About Me
I'm a Cyber Security practitioner based in India with a strong foundation in Cyber Security and machine learning (AI). My journey in Red Teaming started 7 years ago, and I've been constantly learning and adapting to new technologies ever since. Currently pursuing B.Tech in Computer Science (2nd year) at BRCM CET, Bahal
I specialize in Analysing responsive Botnet , Researching Advanced Persistent Threats (APTs) and state-sponsored cyber warfare malware , neural networks and cloud based VPS servers Development using modern frameworks and libraries. My approach combines technical expertise with creative problem-solving to deliver solutions that not only look great but also perform ethical research practices by thinking out of the Box Exploits, Studing zero-day vulnerabilities in controlled environments
When I'm not coding, you can find me exploring and Thinking about new technologies, contributing to open-source projects, or sharing knowledge with the Cyber Security community through my blog and social media.
Education
Computer Science B.tech
Computer Diploma RSCIT
Cyber Security Unified Mentor
Machine Learning CISCO
Block Chain icat
Location
Gogameri, Rajasthan (currently Bahal, Haryana)
Experience
2+ Years Cyber Security Domain
Skills & Expertise
Programming
Cyber & Networking
Web & Tools
Operating Systems
Certifications
Cyber Security – Unified Mentor
Completed structured Cyber Security training including networking, vulnerability analysis, and ethical hacking fundamentals.
View CertificateMachine Learning – CISCO
Hands-on training in AI fundamentals, neural networks, and ML pipelines.
VerifyBlockchain – ICAT
Fundamentals of blockchain technology, distributed systems, and smart contracts.
View DetailsRSCIT Computer Diploma
Basic computer fundamentals, digital literacy, and IT systems knowledge.
CertificateWhat I Do
Low-level Programming
Writing efficient programs in C/C++ and exploring system internals.
Security Practice
CTF practice, vulnerability exploration, and learning pentesting Advanced.
Reverse Engineering & Automation
APK projects, Malware Autopsy , and Neural Networks to automate tasks.
Featured Projects
Mirai Source Code
This repository contains the Mirai botnet source code preserved strictly for educational, research, and cybersecurity analysis purposes. It is intended to help learners and security professionals understand how large-scale IoT malware operates at a technical level.
Open Source Intelligence
The repository includes resources for network reconnaissance, domain and IP intelligence, email and username enumeration, social media intelligence (SOCINT), geolocation analysis (GEOINT), and metadata extraction. All tools and workflows focus on ethical OSINT practices and legal intelligence gathering.
Contracts Daemon
Contactsd is a secure CLI-based contacts management system built using modern cryptography. It encrypts all stored data using AES-256-GCM, providing confidentiality, integrity, and authentication. Encryption keys are derived from a master password using PBKDF2-HMAC-SHA256 with 150,000 iterations and a unique salt for each record. All cryptographic operations are implemented via OpenSSL. Without the correct master password, stored data remains unreadable and tamper-detection is enforced through GCM authentication tags.
Mac Address Randomizer
A privacy-focused systemd-based Linux service that periodically randomizes MAC addresses for all active network interfaces using macchanger. The service supports Arch, Debian, and Fedora-based distributions, utilizes dynamic interface detection, and includes a kill-switch to block network access if MAC spoofing fails, ensuring consistent privacy protection.
Blackarch opensource contribution
This repository focuses on working with BlackArch-Linux, a penetration-testing and security-research distribution built on Arch Linux. It is designed for learning and practicing ethical hacking, cybersecurity analysis, and offensive security techniques in a controlled and legal environment.
Venice-firewall
The system integrates both offline AI models and online AI services to analyze network traffic patterns, detect suspicious or anomalous behavior, and automatically resolve traffic decisions without manual intervention with Admin Mail Messaging System. This enables real-time adaptive filtering and intelligent security enforcement.