top of page

About Me

Hello, I'm Harshul, and I'm passionate about everything related to cybersecurity. The dynamic nature of this field excites me, whether it's ethical hacking, penetration testing, or finding innovative ways to protect sensitive data. I enjoy the thrill of solving complex challenges and staying ahead in the ever-evolving digital landscape. Over time, I've gained valuable insights through my studies, certifications, and hands-on experiences. This website is my space to share those learnings, document my journey, and connect with like-minded individuals. Cybersecurity isn't just a career for me; it's a mission to make the online world safer and more secure for everyone. I'm excited about what lies ahead and look forward to growing further in this field!

IMG_7801.jpg

Certifications

0d8ef558-2aec-4728-8db0-f8de215020c7.png

OSWE certification demonstrates advanced skills in identifying and exploiting vulnerabilities in web applications. It validates expertise in web application security through rigorous practical testing and mastery of the WEB-300 course

a734a218-3722-4a18-b253-e7033c0443a3.png

OSWP certification focuses on wireless network security. It demonstrates the ability to identify and exploit vulnerabilities in wireless networks, including cracking WEP/WPA encryption, achieved through the PEN-210 course and practical assessment

CEHPRACTICAL_5FB43496785F (1).png

C|EH Practical certification highlights hands-on skills in ethical hacking through a rigorous practical exam. It tests the ability to apply hacking techniques in real-world scenarios to secure systems effectively

4c36662d-83d9-40b8-8495-38b9856f0744.png

OSWA certification validates foundational skills in web application security. It demonstrates the ability to identify common vulnerabilities and understand core web exploitation techniques through practical testing and the WEB-200 course

335fe9d5-be26-4776-8a80-cb1fcafdc10c.png

eCPPT certification validates comprehensive penetration testing skills. It covers advanced topics like vulnerability assessment, exploitation, and reporting, emphasizing hands-on, real-world scenarios for web and network security

CEH_2E345519D3F7 (1).png

C|EH certification validates foundational skills in ethical hacking and cybersecurity. It focuses on understanding and mitigating threats by employing techniques used by malicious hackers

ecf8d2f0-5f08-474d-aa73-4c243719df8d.png

OSCP certification is a highly respected credential in penetration testing. It showcases hands-on skills in network exploitation, vulnerability assessment, and ethical hacking, achieved through the rigorous PEN-200 course and practical examination

CEHMASTER_5FB43496785F.png

C|EH Master certification demonstrates advanced expertise in ethical hacking by requiring candidates to pass both a theoretical and practical exam, showcasing deep technical knowledge and real-world problem-solving abilities

Education and Training

assertion-8oVeQUjeQGi623jtD3P61w.png

Cybersecurity Master's Degree at the University of Padua is a specialized program focusing on advanced topics in cybersecurity, cryptography, network security, and software protection. The curriculum includes theoretical foundations and practical applications, preparing graduates for roles in securing critical systems and combating cyber threats

1200x630wa.png

IBM Cybersecurity Analyst Professional Certificate equips learners with essential skills in cybersecurity. It covers network security, incident response, threat management, and compliance, preparing individuals for roles like cybersecurity analyst through hands-on labs and industry-relevant projects

thm_logo_circle.png

Security Engineer Path is designed to equip learners with the skills to design, implement, and maintain secure systems. It covers topics like network security, system hardening, vulnerability management, and secure software development through hands-on labs and practical exercises

thm_logo_circle.png

SOC Level 1 Path focuses on the skills needed for a Security Operations Center (SOC) analyst role. It covers threat detection, incident response, log analysis, and SIEM tools through practical, hands-on exercises and real-world scenarios

Dhirubhai_Ambani_Institute_of_Information_and_Communication_Technology_logo.png

B.Tech in ICT program at DA-IICT combines computer science, electronics, and communication engineering. It focuses on developing strong technical foundations in areas like software development, networking, embedded systems, and data science, preparing students for versatile careers in technology and innovation

thm_logo_circle.png

Red Teaming Path provides comprehensive training in offensive security techniques used in real-world red teaming operations. It covers adversary emulation, lateral movement, privilege escalation, and post-exploitation tactics through interactive, hands-on labs and scenarios

thm_logo_circle.png

SOC Level 2 Path builds on foundational SOC analyst skills, focusing on advanced threat detection, malware analysis, digital forensics, and incident management. It provides hands-on labs and real-world scenarios to prepare for higher-level SOC roles

thm_logo_circle.png

Introduction to Cybersecurity Path is designed for beginners to build foundational knowledge in cybersecurity. It covers key topics like network security, basic cryptography, and common cyber threats through engaging, hands-on labs and interactive exercises

udacity-icon.webp

Ethical Hacker Nanodegree program from Udacity provides practical training in ethical hacking techniques and cybersecurity principles. It focuses on vulnerability assessment, penetration testing, and securing systems through hands-on projects and real-world scenarios

thm_logo_circle.png

Offensive Pentesting Path provides comprehensive training in offensive security techniques. It covers vulnerability assessment, exploitation, privilege escalation, and post-exploitation skills, preparing individuals for real-world penetration testing through hands-on labs and practical scenarios

thm_logo_circle.png

Cyber Defense Path focuses on defensive cybersecurity skills, including threat detection, incident response, malware analysis, and security monitoring. It provides hands-on labs and real-world scenarios to prepare learners for roles in cyber defense and security operations

Courses [Technical and Security]

  • Ethical Hacking

  • Digital Forensics

  • Mobile and IoT Security

  • Information Security

  • Cybersecurity and Cryptography: principles and practices

  • Computer and Network Security: Advanced Topics

  • Security Protocols

  • System and Network Security

  • Biometrics

  • Machine Learning

  • Deep Learning

  • Law and Data

  • Internet of Things and Smart Cities

Research Projects

Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures [Masters Thesis]

My thesis proposes a novel approach to detecting drone invasions that utilize privacy-preserving protocols. The proposed approach can detect drones invading the restricted areas while maintaining the privacy of drones and organizations. This research provides a valuable contribution to the field of drone detection and privacy protection and can be applied in various domains. Overall, this work demonstrates the possibility of detecting drone intrusions while preserving the privacy of all parties involved.



Partial License plate matching protocol

Developed a privacy-preserving protocol for secure matching of Partial License Plate using Fully Homomorphic Encryption, using Microsoft SEAL library and other FHE schemes. It was acomplished by exploring wildcard based equality testing. The project was developed in C++ programming language.

QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application [ICTSCI'19

This project was a part of research internship (B.Tech project) at Advanced Data Processing Research Institute, Department of Space. Our team developed a Secure Mail Web Application with Quasi Groups and modifications over Shamir’s Secret Sharing. This project was done using C++, Java and Python programming languages. HTML, CSS, Javascript, JQuery and PHP were also used for web development.


Efficient Implementation of Private License Plate Matching Protocols [SPACE'17

Developed a secure and efficient privacy-preserving protocol for matching of License Plate using Paillier’s Partial Homomorphic Encryption. The project was developed in Java programming language.


Secure Cloud backup using Secret Sharing Schemes

Developed and implemented an efficient and secure Cloud backup using Secret Sharing Schemes. Its objective was to reduce the computation and communication costs with also maintaining CIA Triad. The project was developed in Go programming language.


Fast Private License Plate Matching Using Symmetric Homomorphic Encryption [IEEE ANTS'18]

This project is a subset of Private Set Intersection. For this project, I've developed a privacy-preserving protocol using Symmetric Homomorphic Encryption to compute Hamming distance between two license plate in cipher domain. The project was developed in C++ and Python.


Analysis of Return Oriented Programming (ROP)

Analysed ROP automation tools, Ropper and Ropgadget, and automated the generation of rop gadgets for different shellcodes. Also investigated defense techniques against such attacks.


An Enhanced Privacy-Preserving Recommender System [ISEA-ISAP'19]

Efficient and more secure practical privacy-preserving Recommender System using Additive Elgamal Cryptosystem. The project was developed in Python programming language.


Privacy Preserving Similar Document Matching

Implemented Simhash protocol, for document similarity, and Additive Elgamal Cryptosystem with Eventlet Server. It was part of Summer Research Internship. The project was developed in Python programming language.



Memory Corruption Vulnerabilities

Analysed Buffer overflow, Format strings and Heap overflow attacks with the exploit-exercise's protostar VM. Ret2Libc attack was also investigated alongwith them.

Course Projects



Understanding Privacy Risks on Android

Conducted a literature review to gain insights into the collection of private data on Android devices. Also investigated the impact of privacy regulations, like GDPR, on private information collection.



Secret Sharing Schemes and Image Steganography 

Developed applications for secretly sharing information over public channels using Secret Sharing Schemes and JPEG Stegnography.



Airways Database System

For this project, my team had developed a database for Airways Schedule and reservation.


Shellshock Vulnerability: Implementation and Remediation Techniques 

Implemented the Shellshock attack and observed the severity of the vulnerability and its countermeasures. Also, extended the attack over malicious DHCP server. SEED Labs VM was used for this project.



Home Automation 

Developed a Home Automation and security system using Arduino and Raspberry Pi.



Wireless Earthquake Alarm System

Developed an Arduino based system to detect the Primary waves of an earthquake which are faster and far less dangerous than Secondary waves.



Face Recognition using CNN and KNN 

Developed a Face Recognition application using Convolutional Neural Networks and KNN K-Nearest Neighbors algorithms.



Mini Operating System

For this project, my team had developed a mini operating system. The goal of the project was to understand how the OS works.

Community Activities

Survey of Tech-driven Smart City

Our team generated a report which provided an analysis of the development of one of Smart City in India, GIFT city (Gujarat International Finance Tec-City), Gandhinagar, Gujarat and its nearby areas.

Conducted Survey for Public Distribution System (PDS) 

The objective of this survey was to understand the living conditions of people below the poverty line and the problems they face with the Public Distribution System (PDS).


Rural Internship

I served as a teacher with i-India NGO, where I worked in a school located in a slum area in Jaipur, where many children come from poor backgrounds. The goal of my work was to provide these children with education and opportunities for learning that they might not otherwise have had access to.

Digital Skills

Programming Languages

  • Bash

  • C

  • C++

  • Java

  • JavaScript

  • PHP

  • Powershell

  • Python

  • SQL

Cybersecurity Expertise

  • Active Directory Security

  • Cyber Threat Intelligence

  • Incident Response

  • Linux

  • Windows

  • Phishing

  • Privilege Escalation

  • Red Teaming

  • SIEM Tools

  • Vulnerability Assessment

  • Web Application Security

Cybersecurity Resources and Frameworks

  • CVE Details

  • MITRE ATT&CK Framework

  • OWASP

  • Tactics, Techniques, and Procedures

Cybersecurity Tools and Technologies

  • Android App Development (Android Studio)

  • Arduino

  • Raspberry Pi

  • GHIDRA

  • IBM Guardium

  • IBM QRadar

  • Chisel

  • Nmap

  • Nessus

  • Penetration Testing Tools

  • Machine Learning and Deep Learning Techniques

Data Privacy and Compliance Expertise

  • GDPR

  • ISO 27001

  • ISO 27002

  • NIST Framework

Professional Interests

  • Interactive Cybersecurity Training

  • Cryptography

  • Cybersecurity Compliance

  • Penetration Testing

  • Ethical Hacking

  • Data Security and Privacy

  • Operating Systems Security

  • Privacy-preserving Protocols

  • Research & Development

Hands-On Cybersecurity Experience

  • Capture The Flag (CTF)

  • Hack The Box: Pro Hacker

  • TryHackMe: Top 1%

  • Offensive Security Proving Grounds

Management and Leadership Skills

  • Convenor of Electronics Hobby Club at DA-IICT
  • Coordinator of Workshop on Manual and Autonomous Robotics at DA-IICT

Honors and Awards

  • Hack The Box: Pro Hacker
  • TryHackMe: Top 1% 
  • Presented the paper titled, Fast Private License Plate Matching Using Symmetric Homomorphic Encryption at IEEE ANTS'18
  • Presented the paper titled, Efficient Implementation of Private License Plate Matching Protocols at SPACE'17
  • Achieved Second rank in Autonomous Line Following bot Competition at DA-IICT
  • Achieved Third rank in Autonomous Line Following bot Competition at IIT Jodhpur

Language Skills

  • Hindi: Mother Tongue
  • English: Fluent
  • Italian: Limited working proficiency

Hobbies

  • Participating in Capture the Flag competitions
  • Swimming
  • Playing Cricket and Badminton
  • Travelling

Contact

Address

Padova (Italy)

Email

Connect

  • Github
  • GitHub
bottom of page