Skip to content
View kirankumark-sec's full-sized avatar

Block or report kirankumark-sec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kirankumark-sec/README.md
Typing SVG

LinkedIn GitHub Old Gmail Bugcrowd Blog Resume

Profile Views Focus Status Location



About Me

Hacking GIF

┌──(kiran㉿iisc-bangalore)-[~]
└─$ cat whoami.txt

  Name     :  Kiran Kumar K
  Role     :  Junior Security Analyst — IISc DIGITS/ISO
  Location :  Bangalore, Karnataka 🇮🇳
  Email    :  kirankumark.sec@gmail.com
  Focus    :  VAPT · SOC · Digital Forensics · IoT Security
  Mindset  :  Offensive thinking. Defensive discipline.

┌──(kiran㉿iisc-bangalore)-[~]
└─$ cat impact.log

  🔴 563 CCTV cameras secured (default creds + full PoC)
  🌐 30+ web apps tested — 100% remediation compliance
  ⚡ 40% incident response time reduction via automation
  🛰️  NASA · Stanford · Govt portals — responsible disclosures
  🐍 Python automation — NCCC threat intel processing

  • 🔭 Currently working as Junior Security Analyst at IISc Bangalore (DIGITS/ISO)
  • 🌱 Specializing in VAPT, SOC Operations, Digital Forensics & IoT Security
  • 🐛 Active Bug Bounty Hunter — public disclosures to NASA, Stanford & Govt portals
  • 🛡️ Expert in Microsoft Sentinel, Intune, Qualys, Rapid7, Wazuh & CrowdStrike
  • ⚡ Built Python automation processing NCCC threat intel — reduced IR time by 40%
  • 📷 Discovered 563 CCTV cameras with default credentials at IISc — full PoC delivered
  • 📝 Writing about cybersecurity at kirankumark3.blogspot.com
  • 📬 Reach me at kirankumark.sec@gmail.com


🏆 Hall of Fame — Security Disclosures

🚨 Severity 🏛️ Organization 🔍 Vulnerability 📅 Date
Critical NASA (4 websites) Bulk Directory Listing — internal dirs & sensitive files exposed Aug 2024
Critical IISc Campus (Internal) 563 CCTV cameras — default credentials, full admin takeover via PoC 2025
High Stanford University AWS S3 Misconfiguration — sensitive institutional data exposed Jul 2024
High Hrylabour.gov.in Reflected XSS — Govt of Haryana Labour Portal Jun 2024
High Patanjaliayurved.net High-severity XSS — acknowledged & resolved Jul 2024

NASA VDP


💼 Professional Experience

🔴 Junior Security Analyst — IISc DIGITS/ISO, Bangalore  |  Jul 2025 – Present

VAPT & IoT Security

  • 🎯 Executed VAPT on 30+ IISc websites (SQLi, XSS, IDOR) using OpenVAS & Burp Suite Pro — 100% remediation compliance
  • 📷 Discovered 563 CCTV cameras across 4 NVR systems with default credentials — demonstrated full admin takeover via PoC
  • 🔍 Performed CVSS-based vulnerability prioritization and collaborated with dev teams to integrate fixes into SDLC

SOC Operations & Digital Forensics

  • 🛡️ Managed 50+ Microsoft Defender alerts and 35+ Azure agentless alerts — threat hunting, endpoint isolation, incident response
  • 🔬 Led forensic investigations of live cyberattacks using MITRE ATT&CK — traced attack vectors, delivered hardening roadmaps
  • 🐍 Built Python automation processing NCCC threat intel (IOCs, IOAs, honeypot logs) — reduced IR time by 40%

Infrastructure Hardening

  • ☁️ Guided teams to disable xp_cmdshell on MSSQL servers — eliminating RCE vectors from Azure environment
  • 🖥️ Deployed Microsoft Intune + Azure AD Join for 170+ systems with LAPS, USB restrictions & ASR rules
  • 📊 Deployed Wazuh SIEM with agent-based setup across 170+ endpoints for centralized log monitoring
🟡 Information Security Intern — IISc, Bangalore  |  Mar 2025 – Jun 2025
  • Performed black-box VAPT on IISc subdomains using OpenVAS and Burp Suite Pro
  • Delivered CVSS-prioritized PoC reports covering the full OWASP Top 10 vulnerability list
  • Analyzed Apache/Nginx web server logs to detect anomalies, brute-force attempts & unauthorized access
🟠 Cloud Application Developer — NCVET (Remote)  |  Aug 2024 – May 2025
  • Developed cloud-native applications following Secure SDLC principles
  • Hardened AWS deployments, IAM policies and prevented access misconfigurations
  • Applied container security best practices using Docker Compose and network isolation
🟢 Independent Bug Bounty Researcher  |  Mar 2023 – Dec 2024
  • 🛰️ NASA — Bulk Directory Listing across 4 subdomains · Publicly acknowledged on Bugcrowd · CRITICAL
  • 🎓 Stanford University — AWS S3 Misconfiguration exposing institutional data · HIGH
  • 🏛️ Hrylabour.gov.in — Reflected XSS on Govt of Haryana Labour Portal · HIGH
  • 🌿 Patanjaliayurved.net — High-severity XSS vulnerability, acknowledged & resolved · HIGH

🛠️ Tech Stack & Tools

🎯 Penetration Testing & Offensive Security

Kali Linux Burp Suite Metasploit Nmap SQLMap OWASP ZAP Hydra Nikto John The Ripper Hashcat Gobuster Aircrack-ng

🛡️ SOC, SIEM & Defensive Security

Microsoft Defender Azure Sentinel Wazuh Splunk Elastic Stack Rapid7 CrowdStrike SentinelOne Proofpoint

🔬 Vulnerability Management

Qualys Nessus OpenVAS Rapid7 InsightVM Asimily

☁️ Cloud & Network Security

Azure AWS Intune Wireshark PacketFence Nginx Docker

🔐 AppSec & API Security

Postman Fortify SCA Checkmarx OWASP Swagger

⚙️ Languages & Scripting

Python Bash SQL Java JavaScript PHP

🖥️ Operating Systems & Platforms

Kali Linux Arch Linux Red Hat Ubuntu Windows Server Raspberry Pi

🧰 Dev Tools & Frameworks

Git VS Code Vim Django MySQL MongoDB OpenCV Streamlit WordPress Arduino


🚀 Featured Projects

🔢 📦 Project 🛠️ Stack 📝 Description
01 Ethical-Hacking-MasterGuide HTML CSS JS Interactive beginner-to-advanced cybersecurity notes — 19 chapters, 60+ tools, 150+ commands. Fully offline.
02 LogAnalyzer-Pro Python Regex DataViz Real-time server log parser — visualizes security alerts & detects anomalies. Used for Apache/Nginx forensics at IISc.
03 Network Forensics Correlator Bash Sophos RADIUS Correlates Sophos Firewall + RADIUS logs for user attribution during incidents. Cuts investigation time by 40%.
04 Brouteforce Engine Python Sockets Custom brute-force simulation engine to test authentication robustness & verify security logging.
05 Docker WP Hardening Docker Compose Containerized WordPress with network isolation, least-privilege principles & hardened security config.

📜 Certifications & Badges


Ethical Hacking Essentials
EC-Council · EHE

Network Defense Essentials
EC-Council · NDE

CompTIA Security+
Coursera / Infosys SpringBoard

AWS Developer — Associate
Amazon Web Services

Bug Bounty & Web App Hacking
Udemy

API Fundamentals Student Expert
Postman · Nov 2023

Postman API Fundamentals Student Expert Badge

🏅 Postman API Fundamentals Student Expert
Verified Badge · Awarded Nov 15, 2023

View All Certifications


📊 GitHub Statistics


🌐 Connect With Me

LinkedIn GitHub Gmail Blog Bugcrowd X / Twitter Instagram Holopin

@kirankumark3's Holopin board


╔══════════════════════════════════════════════════════════════════════════╗
║                                                                          ║
║   "Security is not a product, but a process."  — Bruce Schneier         ║
║                                                                          ║
║   Every vulnerability found. Every system hardened.                     ║
║   Every incident investigated — it's an ongoing mission.                ║
║   Not a task. Not a job. A responsibility.                               ║
║                                                                          ║
╚══════════════════════════════════════════════════════════════════════════╝

Pinned Loading

  1. security-hardening-guide security-hardening-guide Public

    A curated collection of practical security hardening guides for modern applications, frameworks, and platforms. This repository is designed to help developers, system administrators, and security t…

    HTML 9

  2. Ethical-Hacking-MasterGuide Ethical-Hacking-MasterGuide Public

    A comprehensive, offline‑ready interactive HTML guide that takes learners from networking basics to advanced ethical hacking and cyber security concepts, all in one place.

    HTML 3

  3. yotrixx-web yotrixx-web Public

    A modern, highly interactive landing page for Yotrixx, a next-generation learning platform for SketchUp, Lumion, Architecture, Interior Design, and Construction. This front-end project is designed …

    HTML 6

  4. portfolio portfolio Public

    A personal cybersecurity portfolio website showcasing my experience, projects, tools, and security research, hosted on GitHub Pages.

    HTML 4

  5. patil-architectural-interiors patil-architectural-interiors Public

    This is the official website for Patil Architectural and Interiors, a full-service architecture and interior design firm based in Bagalkot, Karnataka. The site is a single-file, self-contained HTML…

    HTML 7 1