BSc (Hons) Ethical Hacking and Cybersecurity
2024 - Present at Softwarica College of IT & E-commerce, Kathmandu, NepalA hands-on degree focused on ethical hacking, penetration testing, network defense, and digital forensics.
Higher Secondary Education (+2) – Science
Completed in NepalMajored in Mathematics, Physics, Chemistry, and Computer Science, building a strong analytical and technical foundation for further studies in cybersecurity and computing.
School Level Education (SEE)
Completed in NepalCompleted school-level education with a general academic background.
Cybersecurity Project Development
2024 - Present (Academic & Personal Work)Built multiple cybersecurity tools and simulations including password crackers, honeypots, encrypted messaging applications, and phishing simulators. Focused on real-world attack scenarios, vulnerability discovery, and defense techniques.
Cybersecurity Challenge Designer
2025Designed practical cybersecurity challenges by embedding encoded SSH credentials within HTML source code. Helped users practice enumeration, decoding, and lateral thinking in a controlled environment.
CRYM – Network Scanner (Nmap-like Tool)
Personal ProjectA custom-built network scanning tool inspired by Nmap, designed for reconnaissance and service detection. Supports host discovery, port scanning, and basic enumeration techniques.
suyoCr4ck – ZIP Password Cracker
Python ToolA dictionary-based brute-force tool used to crack password-protected ZIP files, demonstrating practical password attack techniques.
HoneySentinel – Lightweight Honeypot
Intrusion DetectionA minimal honeypot designed to detect unauthorized access attempts and log suspicious activity.
SecureChatApp – Encrypted Messaging
End-to-End Encryption ConceptA secure chat application implementing encryption techniques for private communication.
Steganography Tool
Data Hiding UtilityA tool for hiding secret messages inside images using steganographic techniques.
Social Engineering Simulator
Phishing SimulationA mock phishing framework demonstrating how attackers manipulate users through deceptive interfaces.
- Enumeration & Recon
- Reverse Shells
- Web Exploitation
- Penetration Testing
- Network Scanning
- Python
- Linux
- Windows
- macOS
- Burp Suite
- Nmap
- Wireshark
- Basic Cryptography
- Steganography
- Social Engineering