Specializing in web application security, infrastructure security, and cryptography with over 3 years of hands-on experience in the cybersecurity field.
Hey, I'm Upesh Bhujel aka Cupid, a 20-year-old Penetration Tester passionate about cybersecurity and ethical hacking. Currently pursuing my undergraduate degree at Prithivi Narayan Campus, Tribhuvan University, Nepal in B.Sc. CSIT (5th Semester).
With over 3 years of hands-on experience in cybersecurity, I specialize in identifying and exploiting vulnerabilities in web applications and infrastructure. My expertise spans web security, penetration testing methodologies, cryptography, and Linux server hardening.
I'm actively engaged in security research, participating in CTFs, and exploring innovative approaches to cybersecurity challenges. My goal is to contribute to building more secure digital environments through offensive security practices and knowledge sharing.
A specialized tool developed to verify the activity status of .onion links in the Tor network, helping researchers navigate dark web resources efficiently.
Modified and enhanced an open-source dark web monitoring solution to customize functionality according to specific security monitoring requirements.
A collection of bash scripts for encoding and decoding various cryptographic formats, designed to streamline CTF challenges and security assessments.
Achieved top ranking in my country on TryHackMe platform, demonstrating mastery in various cybersecurity challenges, room completions, and practical penetration testing scenarios.
Led multiple teams in Capture The Flag competitions, showcasing effective leadership, strategic planning, and technical expertise in solving complex cybersecurity challenges.
Successfully organized a 48-hour Capture The Flag competition, designing challenges, managing infrastructure, and providing an engaging learning environment for cybersecurity enthusiasts.
Earned the Certified in Cybersecurity certification from ISC², validating professional knowledge in information security and commitment to industry best practices.
Expert configuration and security hardening of Linux servers to protect against unauthorized access and cyber threats. Implementation of security best practices, access controls, and monitoring solutions.
Comprehensive security assessments to identify vulnerabilities in web applications, networks, and infrastructure. Detailed reporting with actionable remediation recommendations to strengthen your security posture.
Systematic evaluation of security weaknesses in systems and applications. Prioritization of vulnerabilities based on risk levels and development of mitigation strategies to address security gaps effectively.
Customized cybersecurity training programs for development teams and security professionals. Hands-on workshops focused on offensive security techniques, vulnerability identification, and secure coding practices.
Feel free to reach out for cybersecurity projects, collaborations, or just to connect with me. I'm always interested in new challenges and opportunities in the security field.