devansh@cyber-portfolio: ~

Devansh Pratap Singh – Cybersecurity, Penetration Testing & SOC Portfolio

devansh@cyber-portfolio:~$ whoami
Devansh Pratap Singh — Cybersecurity-focused Engineer (Pentesting, AD Exploitation, SOC/SIEM)
devansh@cyber-portfolio:~$ help
Available sections: about, focus, labs, projects, contact
Use scroll or jump: about · focus · labs · projects · contact

About – Cybersecurity

devansh@cyber-portfolio:~$ cat cyber.txt

Cybersecurity and cloud-focused graduate with hands-on experience in penetration testing, Active Directory exploitation, SIEM-based threat detection, and AWS cloud security.

Strong foundation in infrastructure & networking, secure system design, and real-world attack simulation labs across Windows and Linux environments.

I enjoy working close to the system: enumerating, exploiting, escalating privileges, and then mapping out mitigations to make the environment harder to break again.

Offensive & Defensive Security Focus

devansh@cyber-portfolio:~$ ls focus
  • pentesting/ad/ — internal attack simulations, AD abuse, privilege escalation.
  • soc-siem/ — log analysis, alert triage, threat detection with Elastic.
  • labs/ — vulnerable machines, exploit chains, and written reports.

Hands-on Labs & TryHackMe

devansh@cyber-portfolio:~$ ls labs

Hands-on platforms and labs used to sharpen practical skills:

  • Offensive labs: Windows & Active Directory exploitation, privilege escalation, post-exploitation.
  • Defensive labs: log analysis, SIEM alerting, basic detection engineering.
  • Cloud labs: securing services and networks mirroring real-world AWS setups.

TryHackMe profile: https://tryhackme.com/p/N30fetcher

Cybersecurity Projects

devansh@cyber-portfolio:~$ ls projects

Vulnerable Machine Exploitation Labs/

Exploited intentionally vulnerable machines to simulate real-world attack scenarios (enumeration, scanning, exploitation, post-exploitation) with structured penetration test reports.

Active Directory Lab Environment/

Virtualized AD lab mimicking a Windows-based domain with Domain Controller and clients, used for administration practice, security hardening, and attack simulation.

Active Directory Lab Exploitation/

Simulated internal penetration tests against a vulnerable AD environment, achieving domain admin via privilege escalation and token impersonation, with documented attack chains and mitigations.

Python Keylogger/

Educational keylogger to study endpoint monitoring and attacker tooling, capturing keystrokes, clipboard data, and system information in a controlled lab environment.

Contact – Cybersecurity Roles

devansh@cyber-portfolio:~$ cat contact.txt
devansh@cyber-portfolio:~$