// INFORMATION SECURITY PRACTITIONER — INDIA

VARUN SINGH

$ whoami — Red Teamer

Security practitioner building deep offensive skills through adversary simulations, hands-on labs, and real-world attack research. Documenting everything — for the community.

varun@kali:~$
varun@kali:~$ cat whoami.txt [ OK ] Loading... Name : Varun Singh Chauhan Location : India Focus : Red Team · Web · Network Platform : HTB · TryHackMe varun@kali:~$ ls certs/ THM_AdventOfCyber.pdf AICLSA_July2025.pdf AICWSE_June2025.pdf AICWSA_Dec2024.pdf varun@kali:~$ _
01 //

ABOUT

I'm an Information Security practitioner with a deep focus on offensive security — red team operations, web application testing, and network security assessments. I build skills through real-world simulations and continuous self-directed research.

This site is my public knowledge base: raw lab notes, CTF write-ups, cert docs, and blog posts — covering everything from Linux internals to Active Directory attacks. Built to help beginners and fellow practitioners alike.

Professionally trained in Offensive Security and VAPT at Armour Infosec, I build skills through real-world simulations and continuous self-directed research.

4+
CERTS
HTB
HACK THE BOX
THM
TRYHACKME
RED
TEAM FOCUS
02 //

SKILLS

Web App Security
OWASP Top 10, manual testing methodology, exploitation and report writing.
BURP SUITEOWASPSQLiXSS
Red Teaming
Adversary simulation, attack chain development, evasion, lateral movement.
MITRE ATT&CKC2EVASION
Network Pentesting
Recon, enumeration, protocol attacks, exploitation on internal/external networks.
NMAPWIRESHARKTCP/IP
Linux Systems
Deep internals, server admin, privilege escalation paths, hardening.
BASHPRIVESCSYSTEMD
Windows & Active Directory
AD architecture, domain attacks — Kerberoasting, pass-the-hash, misconfigs.
ADKERBEROSLDAP
OSINT & Recon
Passive/active recon, attack surface mapping, target profiling.
SHODANOSINTRECON-NG
03 //

KNOWLEDGE REPOS

Webpentest PUBLIC
Detailed Vulnerabilities, exploitation techniques, and testing methodology for web application security assessments.
WEB OWASP EXPLOITATION
Recon, Enumeration, Exploitation, Post Exploitation, Privilege escalation For Network Security Assessments.
NETWORK RECON ENUM
Linux-notes PUBLIC
Linux fundamentals to Administrative Roles — CLI, file systems, permissions, processes, system internals and Different Service Configurations for Enterprise Level Works.
LINUX CLI ROOT
Basic Networking & Windows ON REQUEST
Bios, Foundation of TCP/IP, DHCP & DNS, Windows Server Admin Roles.
TCP/IP WINDOWS AD ENTERPRISE
04 //

CERTIFICATIONS

TryHackMe — Advent of Cyber
TRYHACKME · WEB · CLOUD · MALWARE · DEFENSIVE SECURITY
VERIFY ↗
AICLSA — Certified Linux Server Administrator
ARMOUR INFOSEC · ISSUED JULY 1, 2025
VERIFY ↗
AICWSE — Certified WordPress Security Expert
ARMOUR INFOSEC · ISSUED JUNE 25, 2025
VERIFY ↗
AICWSA — Certified Windows Server Administrator
ARMOUR INFOSEC · ISSUED DECEMBER 2, 2024
VERIFY ↗
05 //

LATEST POSTS

CTF
CTF WRITE-UP
PUBLISHED · 8 MIN READ
Pascal CTF 2026 — GeoGuesser OSINT Challenge
How I identified a street junction in Swieqi, Malta using British road markings, limestone architecture, and Google Street View — my first ever CTF solve.
VIEW ALL POSTS →
06 //

CONTACT

Open to collaborations, freelance security assessments, bug bounty partnerships, and connecting with fellow practitioners.

// RESPONSE TIME : 24-48 HOURS
// AVAILABLE FOR : FREELANCE · COLLAB · MENTORSHIP

vruncybersec@gmail.comEMAIL github.com/Varun-Singh1GITHUB linkedin.com/in/varun-singh-chauhanLINKEDIN