ƒ
ã
ƒ
ƒ
ƒ
¤
ã
ã
ƒ
ƒ
ƒ
ã
ƒ
ƒ
·
Š

­
ƒ
 
¢
ã
Ÿ

ã
±
ã
ƒ
ã
ƒ
ã
ã
ã
©

ã
Ž
ã
ƒ
ã
ã
ƒ
ƒ
ƒ

¨
¯
ã
ƒ
¯
·
ã
ƒ
¹
ã
ã
ã
ã
¨
ã
ƒ
·
«
ã
ã
ƒ
ã
¯
ã


»
0
¢
ƒ
¦
²
ã
ã
«
­
²
˜
1
ã
ã

ã
ƒ
ƒ
ã
ã
·
ã
ã
©

ƒ
ã
ã
ã
ã
ã
¢
¦
¤
¿
ã
ƒ
ƒ
¿
­


ƒ
Ž
ã
ƒ
ã
ã
ã
ƒ
ã
ã

ã

ã
¨

ƒ
ã
ƒ
ƒ
ã
ƒ
0
ƒ
ƒ
ã
ã
ã
»
ƒ

ƒ

ƒ
¦
˜

ã
ã
³

ã
ã

ã
¯
ã


»
ã
«
ã
ã

ã
ã
¨

ƒ
ã
ƒ
¦
ã
ã

ƒ
ã
ˆ

ã
ƒ
ã


 
ƒ
«
ã
³
ã
ƒ
0
ã
ƒ
ã
¹
ã

ã

»

ã

¦
ã

ã
ã
ã
ã
Ž
ƒ
ƒ
¯
ã
ƒ
ã
ƒ
µ
ƒ
ã
²


ƒ
Ž
ƒ
ƒ
ƒ

ƒ
ã
ƒ
«


¬
ƒ
ã
0
¨
¦
»
ˆ
ã
ã
ã
·
ƒ
¯
ã
«
³
·
«

ã
ƒ
ƒ
ã
ˆ

©
ã
ã


ƒ
¦

ƒ

ˆ
ƒ
ƒ
ƒ
ƒ
ã
³
ã
«
ã
ƒ
ƒ
ã
ã
ª
·
ã
Ÿ
ã
ã
ƒ
ã
ã
ã
²
ƒ
Œ
ã
ƒ

ƒ
¹
ã
ã
ã
ã
¯
¢
ã
ã
ã


Ÿ
ã
¨

ƒ
ƒ
ƒ
ã
ƒ
ã
ƒ
ã
ã
ã
ƒ

ƒ
ã
ã
ã
ƒ
ƒ

ƒ
ã
ã
³
ã
¦
ƒ
»
ã
ƒ
¦
¦
ƒ
¢
ã
¦
ã
ƒ

Ÿ
ã
ã
ã
ã
ã

ã
ã
¢

µ
˜
¨

ã
ã
ƒ

Œ
ã
ƒ
³
­
¨
ƒ
ã
­
ƒ
«
ƒ
ƒ
ƒ
ƒ
ƒ
³

µ
ã
¨
¦
ƒ
ã
ž
ˆ
ƒ
ƒ
­
1
ã
ã
ã
ã
ã
ã

ã
ˆ
­
±
ƒ
ã
¿
ã
ã


¢

ƒ
ã
ã
ã
ƒ
ã
ã
ã
«
ã
ã
ã
³
¢
ã
½
ƒ
ã
ã
ã
ƒ

ã
ƒ

«
ã
ª

½

ƒ
ž
ƒ
Ž
ã
ª
ã
ã
ã
·

ã
ã

ã
ã

ƒ
¬
ƒ
0
¬

¯
ƒ

ƒ
­
¦
ƒ
ã
ã
ã

³

ƒ
³
ã
«
ƒ
ƒ
ã
ã
ƒ

ƒ
¦
³
ƒ
0
ã

0
­

Ž
ã
 
¦

ã
ã

µ
ƒ
ƒ
ã
ã
ƒ
ƒ
ã
ã
ƒ
½
ƒ
²
ã
ã

ã

ã
ƒ

¯

¯


ƒ
ƒ

©
µ
¨
ƒ
ƒ
ã

½

˜

ã
ž
¿

¦
¨

ƒ
ƒ
ƒ

ã


Ž
ã
ƒ


ƒ

ã
0
ã

ã
ƒ
ƒ
¦
«
¨
µ
Ÿ
Š
ã
¬
ã
ƒ

«
ƒ
0
ã
ã
ƒ
ã
ƒ
ƒ
¦
¨
ƒ
ã
ƒ
ã
·
ƒ
ƒ
ƒ

ƒ


ã
ã
ƒ
ª
ƒ
ã
ã

Œ
ã
ƒ
ƒ
ã
¯
ã
1
ã

ª
ã
ƒ
ƒ
ã
ƒ
ƒ
ã
½
ƒ
Ž
ã
¨
ƒ
ã

ã
ƒ
ƒ
ã

ã
©
ƒ
ã
¤
ã


ã

ƒ
ƒ


ã
ƒ
ã
¹
Š
ã

ã
ã
ã
ã

ã
ã
ã
ƒ
ƒ
ƒ

ƒ
ã

ã
ƒ
ã
¨
ã
ƒ
ã

ž
ã
¨
¨
³
¯
ã
¨
ƒ
ª
ã
ã
¤
¯
ƒ
ƒ
ã
ã


»
ƒ
«
ã
ƒ
ã
ƒ
ƒ
ã

¤

ƒ
ƒ
ƒ
ã
ã
ã
ã

ã
±
ã
ƒ

ã

«
«
ã

ã
ƒ
«


ã
ã
ƒ
ž
ª
ƒ
­
Œ
ã
ƒ
ã
³
¯
ƒ

ã
ã

¨
ã
ã
ƒ
ƒ
ƒ
¢
­

ã
¿
ã
ã
Œ
ã

ƒ
ã
ã
¡

ã

ã

«
ã

ƒ
²
ƒ
ƒ
ã
 
Š
ƒ
ã

ã
ƒ
ã
Š
ã
¨
ƒ
¬
ã
ã
ã
ƒ
ã
ã

ã

ã

«
0

¯
ª

ã
ã
ƒ
ƒ
ª
ã

ã
ã
ž
ƒ
ã
ƒ
ã
¿
ã
ƒ
¯
ƒ
ž

±
¤

ã
ã

Ž
¹
ã
ª
ã
ª
ã
ƒ
ˆ
ã
ã
ã
¤
¯
ã
­
Ÿ

ã
ˆ
ã
¤
ˆ
¹
ƒ
ã
ã
ƒ
ƒ
ã
¬
ã
ƒ
ã


±
ˆ

ž

¢


ã
ƒ
­
ã
ã

ã


ã
ƒ


ã

ƒ
±
ã
ã
ª
ã
Ÿ
«
ã
ƒ
ã
ˆ
ƒ


ã
ã
­
ƒ
ƒ

ã
ª

ƒ

ƒ
ƒ
ƒ
ƒ

·
ã
ã


»
ã
ã
¬
ƒ
³
ã
ƒ
ƒ
ƒ
¢
¤

ã
ƒ
ã

ƒ
­
ƒ
«
ã
ã
ã
¦
ã
ã
ã
ƒ
ƒ
ã
ã
ã
ã
ã
ƒ
ã
ã
·
³
ã
ž
Ÿ
¯
ã
¤
¤
ã

ã
ã

¢
ƒ
ã
ƒ
³
¦

ã

ã
ã
0
ã
ã
ƒ

ƒ
 
ã

ã


ã

ã
¢
ƒ

«

ã
ƒ
ã
ã
ƒ
ƒ
ã
¿
ƒ



©

±
 
Œ
¹
ª
ƒ
©
ã
0
ƒ
ƒ
ƒ
ã
ƒ
ƒ

ã
¤
ƒ

ƒ
ã
ƒ
Œ
ã
¹
ã
ã
ã
»
ˆ
¦
µ
¦
ƒ
ã
ã
¨
ƒ
ƒ
ã
ƒ
ƒ
¬
ã
ƒ

ã
ã
½


ã
½
ã
ª
¤

ã
ã
ƒ
ã
ã
¡
ƒ
ã

ƒ
ã

ƒ
ã
ã
²
ã
ã
ã
ã
ã

˜
¢
­

ƒ
¤
¯
ƒ
ƒ
ƒ
ž

ã

ƒ
ã
ƒ
ƒ
ƒ

ã
ã
µ
ž
­
¡

ƒ
ƒ
Œ
»
ª
ƒ
«
ã


¦
ã
ã

ã

¤

±


ƒ
ã
ƒ
³

ã

¯
²

ã
ã
ã
ã
ƒ
ã
ã
ã
ƒ

ã
­
ƒ
ƒ
ƒ
ã
0
ƒ
ƒ



¢
ƒ
ã
ã


ã
©
ã
¢
ã
¬
0
Ÿ
­

ã
ã
¤
ƒ
ã
ƒ
ž
ƒ
ª

ã
ã
ƒ
«
ã
ƒ
ã
¢
ƒ
ƒ

¦
ƒ
ã
ã
ƒ
­
¢
ã

ã
ã
­
¨
ã
±
¯
ã
ƒ
˜

±
Ÿ
ã

ã

ã

¬
ƒ
ƒ
ƒ
ƒ
ƒ
¨
¤
ã
µ
ƒ
ã
ã
ã
ƒ

ƒ
ã
ƒ

ƒ
ƒ
½
ã




ã
ã
ã
©
ã
Š
ã
ã

ƒ
ƒ
¤
ã
ã

¤
ƒ

ã
ƒ
«
·
ã

ã

ã
ƒ
ã
ƒ
¯
¨
ã
ƒ
¯
ã


ã
Ž
ã
«

ƒ
ã
­
Œ
ã
ã
ã
¬
ã

ã
¡
ã
ƒ
ˆ
¨

 
ƒ
ã
ƒ
ƒ
¡
ã
ã

ƒ
«


cybersec@harshit:~$
root@security:~$ whoami
Harshit Namdev - Cybersecurity Professional
root@security:~$ cat skills.txt
Penetration Testing | Ethical Hacking | Security Analysis
root@security:~$ SYSTE_

Hello, I'm

I'm a

About Me

Cybersecurity professional specializing in penetration testing, web security, and ethical hacking. Combines advanced technical knowledge with hands-on expertise to identify vulnerabilities and strengthen digital infrastructures against threats.

President of the Cybersecurity Technical Club; led and organized 10+ state and national-level technical events, demonstrating strong leadership and a commitment to excellence. Implements proactive security measures and continuously expands expertise in the evolving cybersecurity landscape.

Open to internships, contract roles, part-time positions, and freelance opportunities in cybersecurity. Ready to collaborate on challenging projects, apply advanced skills, and drive professional growth in dynamic environments.

Technical Expertise

Languages & Frameworks

Python
C++
JavaScript
HTML
CSS
Django
Flask
React.js

Cybersecurity

Ethical Hacking
Vulnerability Assessment
Penetration Testing (VAPT)
Network Security
DDoS Mitigation
SIEM
Web Application Security
Linux Administration

Cybersecurity Tools

Nmap
Metasploit
Burp Suite
Wireshark
OpenVAS
Nexpose

Operating Systems

Kali Linux
Ubuntu
Parrot OS
Windows Server
CentOS
Debian CLI

Education

B.Tech in CSE-Cyber Security

Sagar Institute of Science and Technology, Bhopal

I am pursuing B.Tech in CSE Cyber Security at Sagar Institute of Science and Technology, Bhopal, where I focus on ethical hacking and web security. I am enthusiastic about cybersecurity and focused on advancing my knowledge and skills.

Higher Secondary

School for Excellence, Bhopal

I completed my higher secondary education at the School for Excellence, Bhopal, with PCM and IT, developing core analytical and technical skills that sparked my interest in cybersecurity. That paved the way for my passion and pursuit of a career in cybersecurity.

Achievements

Work Experience

Web Security Support

Daily News 24

Apr 2025

Responded to an active DDoS attack and implemented 86 custom firewall rules via Cloudflare to mitigate the threat and protect the platform.

  • Improved incident response and hardened overall server configuration
  • Successfully prevented further attacks and improved platform resilience
  • Implemented comprehensive security measures for ongoing protection

Web Developer Intern

HMJ Fire Safety Services

Feb 2025 - Apr 2025

Designed and developed the official company website and product landing pages with focus on responsive design and user experience.

  • Ensured responsive layout, branding alignment, and user-friendly navigation
  • Focused on front-end security basics and safe input handling
  • Delivered modern, professional web presence for the company

Cyber Security Virtual Experience Program

Deloitte, Forage

June 2025 - July 2025

Completed a hands-on virtual job simulation in cyber security, issued by Forage and Deloitte.

  • Gained practical experience in identifying and responding to security threats
  • Performed simulated tasks aligned with real-world business scenarios in cyber security
  • Enhanced skills in threat analysis and incident response procedures

My Projects

StagnoLab Project

StagnoLab - Flask-based Steganography Tool (In Progress)

Developing a secure data-hiding platform for images, docs, and pdf files. Features include drag & drop interface, password-protected encryption, and retrieval validation. Includes history tracking and advanced analysis for tamper detection.

Python Flask Steganography
VulScan Project

VulScan: Vulnerability and Network Scanner

An application enables users to identify security vulnerabilities, discover network hosts, and generate comprehensive reports about potential security issues. Scanned 50 systems in a classroom test; vulnerabilities identified on 48 machines with varied severity. Output included categorized reports for targeted patching.

Python 3.7 PyQt5 Network Security
Anti-DDoS Tool

Anti-DDoS Tool for Websites

Developed a comprehensive tool to enhance website protection by mitigating DDoS attacks and ensuring uninterrupted service. The tool uses a combination of rate limiting, IP filtering, traffic analysis, and automated response techniques to block DDoS attacks and protect websites from being overwhelmed by malicious traffic.

My Blogs

Oracle Cloud Hack

CISA's Guidance After: Oracle Cloud Hack

The recent hack of Oracle Cloud has sent shockwaves through the cybersecurity community, exposing around 6 million records and affecting over 140,000 tenants.

Read More
Social Media Security

If your social media account is hacked, don't worry!

Comprehensive guide on recovering from social media account breaches and implementing preventive security measures.

Read More
X Twitter DDoS

What Happened on August 13, 2024, on X/Twitter?

Analysis of the major security incident that affected X/Twitter platform and its implications for user security.

Read More

Get in Touch

Get In Touch

Ready to bring your ideas to life

Email

harshitnamdev@gmail.com

Phone

+91 798 725 1569

Connect me on LinkedIn

linkedin.com/in/harshit-namdev