Skip to content
View BadBoy0170's full-sized avatar
💀
💀

Block or report BadBoy0170

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BadBoy0170/README.md

Kunal Ranjan - Cybersecurity Professional

"Securing digital spaces, one vulnerability at a time..."

About Me

Cybersecurity Analyst & AI Enthusiast | Digital Defender | Code Cracker & Network Fortifier

Hello there! I'm Kunal. I'm a cybersecurity professional who believes that the best defense is a good offense, and the best offense is understanding your enemy better than they understand themselves.

What I Do

I specialize in protecting digital assets from the ever-evolving landscape of cyber threats. Think of me as a digital security guard, but instead of a flashlight, I use advanced threat intelligence and AI-powered tools. (And yes, I do occasionally talk to my computer - it's called debugging, not insanity!)

Current Mission

Developing a Cybersecurity CLI tool that streamlines vulnerability assessments and incident responses. Because let's face it, in cybersecurity, time is money, and every second counts when you're racing against a potential breach.


💬 Let's Talk

I'm always interested in:

  • Cybersecurity challenges that need innovative solutions
  • Research opportunities in AI-driven security
  • Professional collaborations that make the digital world safer

"In a world full of vulnerabilities, be the patch that fixes them" 🚀


Coding Animation
Yes, this is what I look like when I'm debugging at 3 AM 😅

Pinned Loading

  1. SIEMcli SIEMcli Public

    A lightweight and modular Security Information and Event Management (SIEM) system with CLI tools for event parsing, querying, and automated analysis.

    Python

  2. Multi-Modal_fusion_Pose_Estimation Multi-Modal_fusion_Pose_Estimation Public

    Implementation of a Multi-Modal Fusion Technique for real-time human pose estimation, leveraging both 2D and 3D sensor data to predict full-body joint positions accurately. Designed for application…

    Python

  3. Network_Anomaly_Detection Network_Anomaly_Detection Public

    A machine learning-based system for detecting anomalies in encrypted network traffic. Supports real-time analysis, multiple detection algorithms, and insightful visualizations.

    JavaScript

  4. P2P_Network_Monitoring P2P_Network_Monitoring Public

    A scalable, decentralized Peer-to-Peer (P2P) Network Monitoring System with SkyEye KOM topology, AES-256 encrypted communications, machine learning-based anomaly detection, and honeypot integration…

    Python

  5. Phantom Phantom Public

    Advanced ARP spoofing tool for ethical penetration testing and educational purposes, supporting Linux, macOS, and Windows with logging and progress visualization.

    Python

  6. shadowprint shadowprint Public

    A Python tool for security research, exploring SSL certificate generation and executable signing to study antivirus evasion techniques in a controlled, ethical environment.

    Python