●  Available for Opportunities & Collaborations

Siddhanta
Gautam

|

"Securing systems. Breaking vulnerabilities. Building trust."

I'm an IT student with a deep passion for ethical hacking and cybersecurity β€” dedicated to turning innovative ideas into practical, secure digital solutions. My journey is fueled by curiosity, creativity, and a constant desire to learn and grow.

Your photo here
πŸ”
Ethical Hacker
Cybersecurity
🐍
Python Dev
Scripting & Tools
πŸ“
Nepal πŸ‡³πŸ‡΅
Available Remote
01 // About Me

Who I Am

I am an IT student with a deep passion for web development and ethical hacking, dedicated to turning innovative ideas into practical and secure digital solutions. My journey in technology is fueled by curiosity, creativity, and a constant desire to learn and grow.

I thrive at the intersection of offense and defense in cybersecurity β€” understanding how attackers think to help build stronger, more resilient systems. My hands-on experience spans network monitoring, vulnerability assessment, penetration testing, and offensive security tooling.

My goal is to become a professional ethical hacker and security researcher who makes the digital world meaningfully safer β€” one vulnerability at a time.

Ethical Hacking Web Pentesting Bug Bounty Python Linux Networking OSINT Reverse Engineering CTF
4+
Projects Built
10+
Tools Mastered
∞
Learning Drive
bash ~ kali linux
siddhanta@kali:~$ whoami
Cybersecurity Student & Ethical Hacker
siddhanta@kali:~$ nmap -sV target.local
Starting Nmap scan... Open: 22/ssh, 80/http, 443/https
siddhanta@kali:~$ msfconsole
[*] Metasploit Framework loaded. Ready to pwn.
msf6 > β–‹
02 // Education

Academic Background

πŸŽ“
Bachelor of Computer System and Information Technology (BCSIT)
Currently Pursuing
πŸ“… Ongoing

Comprehensive IT program covering networking fundamentals, programming, system security, database management, and software engineering principles. Specializing in cybersecurity modules and ethical hacking practices.

πŸ›‘οΈ
Cybersecurity Self-Learning Path
Independent Study
πŸ“… 2023 – Present

Continuous self-directed learning through practical labs, online courses, cybersecurity platforms, and hands-on tool practice. Focus on penetration testing methodologies, exploit development, and bug bounty hunting.

🌐
Web Development & Security
Practical Experience
πŸ“… 2022 – Present

Hands-on experience building and securing web applications. Understanding of OWASP Top 10, XSS, SQL injection, CSRF, authentication vulnerabilities, and secure coding practices from both developer and attacker perspectives.

πŸ”¬
Networking & Infrastructure
Cisco & Lab Practice
πŸ“… 2023 – Present

Practical networking knowledge through Cisco Packet Tracer simulations, including IPv4/IPv6 routing, subnetting, VLANs, firewalls, and ISP simulation. Strong foundation in TCP/IP, DNS, DHCP, and routing protocols.

03 // Skills

My Arsenal

⚑ Technical Proficiency
Python Programming82%
Web Penetration Testing78%
Network Security80%
Metasploit & Exploitation72%
Linux Administration79%
OSINT & Reconnaissance70%
HTML/CSS Web Dev75%
Reverse Engineering (Basic)55%
πŸ›  Security Tools
πŸ”΄ Metasploit πŸ” Nmap πŸ•·οΈ Burp Suite πŸ“‘ Wireshark πŸ’£ msfvenom πŸ‰ Kali Linux πŸ”¬ Metasploitable 🌐 Cisco Packet Tracer πŸ§… Tor / OSINT Tools 🐍 Python Scripts
🧠 Soft Skills
  • Problem Solving & Analytical Thinking
  • Attention to Detail in Security Audits
  • Critical Thinking in Threat Scenarios
  • Continuous Learning Mindset
  • Security Report Writing & Documentation
  • Team Collaboration & Peer Learning
  • Creative Approach to Vulnerability Research
🌐 Areas of Focus
Web App Security Network Pentesting Bug Bounty Hunting Social Engineering Vulnerability Research Malware Analysis
04 // Projects

What I've Built & Practiced

Ethical Hacking
01
Ethical Hacking Labs

Structured penetration testing labs using Metasploit against intentionally vulnerable systems. Documents real-world exploitation techniques used by offensive security professionals.

  • Payload creation with msfvenom
  • Metasploitable 2 & 3 exploitation
  • Post-exploitation and privilege escalation
  • Vulnerability scanning & reporting
MetasploitmsfvenomKali LinuxNmap
Packet Tracer
02
Packet Tracer Networking Lab

Complex networking simulations using Cisco Packet Tracer. Demonstrates real-world routing configurations, ISP setups, and enterprise network design principles.

  • IPv4/IPv6 static & dynamic routing
  • Default routes and ISP simulation
  • VLAN segmentation and inter-VLAN routing
  • Firewall rules and ACL configuration
Cisco Packet TracerIPv4/IPv6Routing
TryHackMe
03
TryHackMe: Offensive Security Intro

Completed the introductory offensive security room on TryHackMe, covering basic tools and methodology of ethical hacking.

  • Fundamentals of penetration testing
TryHackMeOffSec
OhSint
04
TryHackMe: OhSint

Completed the OSINT room on TryHackMe, learning open-source intelligence gathering techniques.

  • OSINT tools and methodologies
OSINTTryHackMe
Google Dorking
05
TryHackMe: Google Dorking

Completed the Google Dorking room on TryHackMe, mastering advanced search operators for information gathering.

  • Google search operators for recon
Google DorkingTryHackMe
PortSwigger
06
PortSwigger Web Security Labs

Hands‑on practice with Burp Suite on the official PortSwigger Web Security Academy, covering critical web vulnerabilities.

  • SQL Injection – extracting data and bypassing authentication
  • XXE (XML External Entity) – reading server files
  • Clickjacking – UI redressing attacks
  • Brute Force – password cracking with Burp Intruder
Burp SuiteSQLiXXEClickjacking
05 // Certifications

Learning Milestones

🎯
eJPT (eLearnSecurity)
eLearnSecurity
Pursuing
πŸ”
CompTIA Security+
CompTIA
Planned
🐧
Linux Essentials
LPI / Self-Study
In Progress
🌐
Cisco Networking Basics
Cisco NetAcad
Completed
πŸ’»
Python for Security
Self-Study / Labs
Completed
🏴
CEH (Certified Ethical Hacker)
EC-Council
Future Goal
06 // Activity

Learning & Growth

πŸ§ͺ
Cybersecurity Labs
Hands-On Practice

Active participation in cybersecurity labs simulating real-world attack-defense environments. Practicing vulnerability exploitation, traffic analysis, and incident response procedures on controlled lab setups.

🎯
CTF Challenges
Competitive Security

Engaged in Capture The Flag-style security challenges to sharpen offensive skills β€” covering web exploitation, cryptography, forensics, binary exploitation, and network-based challenges.

πŸ”¬
Self-Directed Research
Independent Study

Independent deep-dives into ethical hacking, malware analysis, reverse engineering fundamentals, and vulnerability research β€” continuously expanding expertise beyond formal coursework.

πŸ‘₯
Tech Community
Collaboration & Sharing

Active collaboration with tech and security peers β€” sharing knowledge, discussing new attack techniques, reviewing write-ups, and contributing to a culture of open learning in the Nepali tech community.

🌍
Bug Bounty Journey
Responsible Disclosure

Exploring bug bounty programs and responsible disclosure practices. Building a methodology for systematic web application testing including reconnaissance, enumeration, and vulnerability verification.

✍️
Security Writeups
Documentation & Learning

Documenting security research findings, lab exercises, and CTF solutions. Writing clear, reproducible reports that demonstrate understanding of vulnerabilities and their remediation strategies.

07 // Scouting & Leadership

Service & Teamwork

πŸ•οΈ

Nepal Scouts – Troop Leader

Active member of the Nepal Scouts, serving as a Troop Leader in the HICESS Scout Troop. Coordinated team activities, led community service camps, and represented the troop in district‑level events.

πŸŽ‰

Festival & Cultural Volunteering

Volunteered in numerous festivals and cultural programs as a troop leader, helping with event organization, crowd management, and community outreach. These experiences strengthened my teamwork, adaptability, and public speaking skills.

🀝

Leadership & Mentorship

Guided junior scouts in skill development and ethical conduct. Focused on youth leadership development, teamwork drills, and promoting discipline and service β€” values that directly translate to professional cybersecurity collaboration.

🌱

Community Service Camps

Organized and participated in survival training and community service camps that combined outdoor ethics with practical team‑building. These activities taught resilience, crisis management, and the importance of giving back.

08 // Contact

Let's Connect

Open to Collaborations & Opportunities

Whether you need a penetration tester, a curious security researcher, or want to collaborate on cybersecurity projects β€” I'm always open to meaningful conversations. Based in Nepal πŸ‡³πŸ‡΅, available globally.

βœ… Message sent! I'll get back to you soon.
Please enter your name.
Please enter a valid email.
Please enter a message.