[ IDENTITY_VERIFIED ]

Sukhvinder Singh

Cybersecurity Researcher | CTF Player
Handle: para_ninja
Team: root_ninja

"I explore systems, discover vulnerabilities, and solve Capture-the-Flag challenges through research, reverse engineering, and offensive security techniques."

ESTABLISH CONTACT
LAT: 28.6139° N | LON: 77.2090° E
INTERACTIVE TERMINAL
para_ninja@root_ninja:~
root_ninja Secure Access Terminal v2.4.1
Type 'help' for available commands.
 
para_ninja@root_ninja:~$ 
01

ABOUT

The Journey

My journey into cybersecurity began with a curiosity about how systems work—and more importantly, how they can be broken. This fascination evolved into a dedicated pursuit of knowledge in ethical hacking, vulnerability research, and competitive security challenges.

As a CTF player with team root_ninja, I've tackled challenges across multiple domains—from web exploitation to cryptography, reverse engineering to digital forensics. Each challenge is a puzzle waiting to be solved, a system waiting to be understood.

Mission

I believe in responsible disclosure and the ethical application of security knowledge. My goal is to strengthen digital infrastructure by identifying vulnerabilities before malicious actors can exploit them.

50+
CTFs Participated
200+
Challenges Solved
02

SKILLS MATRIX

OFFENSIVE SECURITY

Web Exploitation 90%
Binary Exploitation 85%
Reverse Engineering 88%
Cryptography 75%

DEFENSIVE & ANALYSIS

Digital Forensics 82%
OSINT 78%
Network Security 92%
Linux Systems 95%
03

CTF ACHIEVEMENTS

0
Global Rank
0
CTFs Played
0
Challenges Solved
0
Podium Finishes
3rd Place 2024

National CTF Championship

Team root_ninja secured 3rd position among 500+ teams

Top 10 2024

HackTheBox CTF

International CTF with 2000+ participants

1st Place 2023

Regional Cyber Challenge

First place in web exploitation category

04

WRITEUPS

WEB Medium

SQL Injection to RCE

Exploiting a blind SQL injection to achieve remote code execution on the server.

CRYPTO Hard

Breaking Custom RSA

Analyzing and breaking a flawed RSA implementation with weak prime generation.

REVERSING Hard

Anti-Debug Bypass

Defeating multiple anti-debugging techniques to extract the hidden flag.

PWN Easy

Stack Buffer Overflow

Classic stack-based buffer overflow exploitation with shellcode injection.

FORENSICS Medium

Memory Forensics

Extracting hidden malware from a memory dump using Volatility framework.

WEB Hard

JWT Algorithm Confusion

Exploiting JWT algorithm confusion to forge admin tokens.

05

PROJECTS & TOOLS

VulnScanner Pro

Automated vulnerability scanner with plugin architecture for custom checks.

PYTHON
Stars: 234 Forks: 56

ShellCraft

Interactive shellcode generator and encoder for various architectures.

C/ASM
Stars: 189 Forks: 42

CryptoBreaker

Collection of cryptographic attack implementations for CTF challenges.

PYTHON
Stars: 156 Forks: 38

ReconBot

OSINT automation tool for gathering reconnaissance data on targets.

GO
Stars: 98 Forks: 24

LIVE SYSTEM STATUS

RECENT SOLVES
Web/Template Injection +50pts
Crypto/RSA Factor +75pts
Pwn/Heap Overflow +100pts
GITHUB ACTIVITY
Commits (30d) 47
PRs Merged 12
Issues Resolved 8
LATEST WRITEUPS
JWT Confusion 2d ago
Format String 5d ago
XSS to RCE 1w ago
06

ESTABLISH CONTACT

Communication Channels

Open for collaboration, security research discussions, and CTF team opportunities.

Quick Message