Cybersecurity and cloud-focused graduate with hands-on experience in penetration testing, Active Directory exploitation, SIEM-based threat detection, and AWS cloud security.
Strong foundation in infrastructure & networking, secure system design, and real-world attack simulation labs across Windows and Linux environments.
I enjoy working close to the system: enumerating, exploiting, escalating privileges, and then mapping out mitigations to make the environment harder to break again.
Hands-on platforms and labs used to sharpen practical skills:
TryHackMe profile: https://tryhackme.com/p/N30fetcher
Vulnerable Machine Exploitation Labs/
Exploited intentionally vulnerable machines to simulate real-world attack scenarios (enumeration, scanning, exploitation, post-exploitation) with structured penetration test reports.
Active Directory Lab Environment/
Virtualized AD lab mimicking a Windows-based domain with Domain Controller and clients, used for administration practice, security hardening, and attack simulation.
Active Directory Lab Exploitation/
Simulated internal penetration tests against a vulnerable AD environment, achieving domain admin via privilege escalation and token impersonation, with documented attack chains and mitigations.
Python Keylogger/
Educational keylogger to study endpoint monitoring and attacker tooling, capturing keystrokes, clipboard data, and system information in a controlled lab environment.
Email: Reach Devansh
GitHub: @Neofetcher
Cloud / DevSecOps page: cloud/devsecops page
LinkedIn: Computer Engineer | Cybersecurity & Cloud | Pentesting · SOC · AWS Security
TryHackMe: N30fetcher