██╗ ██╗██╗ ██╗ ██████╗ ██╗ ██╗███╗ ███╗ ██╗██╗
██║ ██║██║ ██║██╔═████╗ ██║ ██║████╗ ████║███║██║
██║ █╗ ██║███████║██║██╔██║ ███████║██╔████╔██║╚██║██║
██║███╗██║██╔══██║████╔╝██║ ╚════██║██║╚██╔╝██║ ██║╚═╝
╚███╔███╔╝██║ ██║╚██████╔╝ ██║██║ ╚═╝ ██║ ██║██╗
╚══╝╚══╝ ╚═╝ ╚═╝ ╚═════╝ ╚═╝╚═╝ ╚═╝ ╚═╝╚═╝
root@wh04m1i:~# cat whoami.txt┌─────────────────────────────────────────────────────────────┐
│ │
│ Name :: Goverdhan Kumar │
│ Handle :: wh04M1i │
│ Role :: Application Security Engineer @ TCS │
│ Founder, Foxfoster Labs │
│ Chapter Lead, Cyber Secured India │
│ Location :: Noida, India │
│ Status :: [■■■■■■■■■■] ACTIVE │
│ │
└─────────────────────────────────────────────────────────────┘
root@wh04m1i:~# cat achievements.txt[+] AppSec Engineer @ TCS ........... SAST · DAST · MAST · Threat Modeling
[+] Built Vector .................... 18 challenges · 4-week web security lab
[+] IndiaSkills Cybersecurity ....... National Silver Medalist 🥈
[+] IndiaSkills Cybersecurity ....... State Gold Medalist 🥇
[+] Cyber Secured Africa ............ International Panel Speaker 🌍
[+] Trainer ......................... 5,000+ students · 15+ colleges across India
[+] TryHackMe ....................... Top 1% among 2M+ users 🔥
[+] Research ........................ AD · Malware · OSINT · Memory Forensics
root@wh04m1i:~# ./vector --info╔══════════════════════════════════════════════════════════════╗
║ VECTOR — Web Security Lab Platform ║
║ 18 real-world challenges · 4 weeks · CTF leaderboard ║
║ In collaboration with OPSWAT Academy & MKITOS ║
╠══════════════════════════════════════════════════════════════╣
║ WEEK 1 :: Surface Mapping ║
║ HTTP recon · Hidden endpoints · Proxy setup ║
║ WEEK 2 :: Input Corruption ║
║ XSS · SQLi · CSP bypass · File upload abuse ║
║ WEEK 3 :: Access Breakdown ║
║ IDOR · Session flaws · JWT attacks · API bypass ║
║ WEEK 4 :: Controlled Collapse ║
║ Race conditions · Business logic · Reporting ║
╚══════════════════════════════════════════════════════════════╝
root@wh04m1i:~# cat skills.sh | grep -E "LOADED|ACTIVE"[LOADED] Web AppSec :: SAST · DAST · OWASP Top 10 · Burp Suite · WAPT
[LOADED] Active Directory:: Kerberoasting · Pass-the-Hash · GPO abuse · BloodHound
[LOADED] Malware Analysis:: Static & dynamic · YARA rules · Behavioral analysis
[LOADED] Memory Forensics:: Volatility · RAM dump analysis · Process injection
[LOADED] Mobile Security :: MAST · APK analysis · iMazing · MVT
[LOADED] OSINT :: Metadata extraction · Steganography · Intel gathering
[LOADED] Red Team :: Attack chains · OPSEC · MITRE ATT&CK · C2 concepts
[LOADED] Network Forensics:: Wireshark · Zeek · Suricata · PCAP · IOC hunting
[LOADED] Scripting :: Python · Bash · C++ · Security automation
[LOADED] SOC & SIEM :: Splunk · IBM QRadar · Alert triage · Log analysis
root@wh04m1i:~# cat certifications.txt┌────────────────────────────────────────────────────────────┐
│ CERTIFICATIONS & CREDENTIALS │
├────────────────────────────────────────────────────────────┤
│ [✓] CAP - Certified AppSec Practitioner (SecOps) │
│ [✓] CNSP - Certified Network Security Practitioner │
│ [✓] CCSP-AWS - Certified Cloud Security Practitioner AWS │
│ [✓] IndiaSkills Cybersecurity - National Silver Medalist │
│ [✓] IndiaSkills Cybersecurity - State Gold Medalist │
│ [✓] TryHackMe - Top 1% globally (2M+ users) │
│ [✓] Cyber Secured Africa - International Panel Speaker │
└────────────────────────────────────────────────────────────┘
root@wh04m1i:~# ./github-stats --user wh04m1iroot@wh04m1i:~# ./tryhackme --profileroot@wh04m1i:~# ./github-trophies --user wh04m1iroot@wh04m1i:~# cat snake.logroot@wh04m1i:~# cat connect.txt> "Break things to understand them. Build things to secure them."_



