Featured Projects
These selected projects reflect my approach to cybersecurity, tackling real-world threats through forensic analysis, automation, and building tools that make defense scalable.

Fingerprinting For Credential Protection
Designed a multi-layered authentication framework that binds user sessions to unique device signatures, neutralizing phishing attacks. Published research presented at VulnCon and BSides Mumbai, providing practical defense against account takeover.

Win IR Harvester
WinIR-Harvester is a comprehensive, script-based incident response toolkit for Windows endpoints that automates forensic artifact collection and analysis. Designed for investigating compromised systems, particularly those affected by Remote Access Trojans (RATs) and other malware threats.

CCTV Secure Gateway
This is an enhanced multi-protocol security gateway with integrated Suricata IDS for comprehensive camera network protection. The system provides real-time threat detection, alert correlation, automated response mechanisms, and a rich API for dashboard integration.

Unveiling AI - The Deepfake Slayer
This unified project combines three detection pipelines for identifying deepfakes across: Videos using CNN+LSTM (ResNeXt50) Images using TensorFlow/Keras-based CNN Audio using MFCC + SVM pipeline Each module is independently usable and deployable, and offers either CLI or Flask-based web interface.
More Projects
More Projects



Secure Mesh
Secure Mesh
SecureMesh is a unified, cross-platform IPsec VPN solution that provides seamless secure communication across Windows, Linux, macOS, and BOSS OS (Bharat Operating System Solutions). Built for defense and enterprise use cases, it simplifies IPsec tunnel management with a consistent interface across all platforms.



CCTV-Attack-Simulator
CCTV-Attack-Simulator
A comprehensive CCTV security simulation designed for defensive security testing and research. This project simulates a realistic IP camera network with intentional vulnerabilities for security training, penetration testing, and vulnerability research purposes.
Featured Projects
These selected projects reflect my approach to cybersecurity, tackling real-world threats through forensic analysis, automation, and building tools that make defense scalable.

Fingerprinting For Credential Protection
Designed a multi-layered authentication framework that binds user sessions to unique device signatures, neutralizing phishing attacks. Published research presented at VulnCon and BSides Mumbai, providing practical defense against account takeover.

Win IR Harvester
WinIR-Harvester is a comprehensive, script-based incident response toolkit for Windows endpoints that automates forensic artifact collection and analysis. Designed for investigating compromised systems, particularly those affected by Remote Access Trojans (RATs) and other malware threats.

CCTV Secure Gateway
This is an enhanced multi-protocol security gateway with integrated Suricata IDS for comprehensive camera network protection. The system provides real-time threat detection, alert correlation, automated response mechanisms, and a rich API for dashboard integration.

Unveiling AI - The Deepfake Slayer
This unified project combines three detection pipelines for identifying deepfakes across: Videos using CNN+LSTM (ResNeXt50) Images using TensorFlow/Keras-based CNN Audio using MFCC + SVM pipeline Each module is independently usable and deployable, and offers either CLI or Flask-based web interface.
More Projects
More Projects



Secure Mesh
Secure Mesh
SecureMesh is a unified, cross-platform IPsec VPN solution that provides seamless secure communication across Windows, Linux, macOS, and BOSS OS (Bharat Operating System Solutions). Built for defense and enterprise use cases, it simplifies IPsec tunnel management with a consistent interface across all platforms.



CCTV-Attack-Simulator
CCTV-Attack-Simulator
A comprehensive CCTV security simulation designed for defensive security testing and research. This project simulates a realistic IP camera network with intentional vulnerabilities for security training, penetration testing, and vulnerability research purposes.
Featured Projects
These selected projects reflect my approach to cybersecurity, tackling real-world threats through forensic analysis, automation, and building tools that make defense scalable.

Fingerprinting For Credential Protection
Designed a multi-layered authentication framework that binds user sessions to unique device signatures, neutralizing phishing attacks. Published research presented at VulnCon and BSides Mumbai, providing practical defense against account takeover.

Win IR Harvester
WinIR-Harvester is a comprehensive, script-based incident response toolkit for Windows endpoints that automates forensic artifact collection and analysis. Designed for investigating compromised systems, particularly those affected by Remote Access Trojans (RATs) and other malware threats.

CCTV Secure Gateway
This is an enhanced multi-protocol security gateway with integrated Suricata IDS for comprehensive camera network protection. The system provides real-time threat detection, alert correlation, automated response mechanisms, and a rich API for dashboard integration.

Unveiling AI - The Deepfake Slayer
This unified project combines three detection pipelines for identifying deepfakes across: Videos using CNN+LSTM (ResNeXt50) Images using TensorFlow/Keras-based CNN Audio using MFCC + SVM pipeline Each module is independently usable and deployable, and offers either CLI or Flask-based web interface.
More Projects
More Projects



Secure Mesh
Secure Mesh
SecureMesh is a unified, cross-platform IPsec VPN solution that provides seamless secure communication across Windows, Linux, macOS, and BOSS OS (Bharat Operating System Solutions). Built for defense and enterprise use cases, it simplifies IPsec tunnel management with a consistent interface across all platforms.



CCTV-Attack-Simulator
CCTV-Attack-Simulator
A comprehensive CCTV security simulation designed for defensive security testing and research. This project simulates a realistic IP camera network with intentional vulnerabilities for security training, penetration testing, and vulnerability research purposes.