Hey there, I'm

Sumz

I build things to break things

A curious and driven security researcher with a focus on field of offensive security. I create tooling, discover vulnerabilities, and help organizations defend by attacking first.

About Me

I’m a security researcher with focus on red teaming, adversary simulation, and tooling. I love to build systems that mimic real-world threats to help organizations proactively test and improve their security posture.

Currently, I work as a Security Researcher at Zeron, where I mostly work on research-driven efforts and while also contributing to developing and automating the EASM module within the Cyber Security Posture Management platform.

Apart from my professional work, I love gaming especially Football related games like Efootball and FIFA. I also enjoy watching football games, more of a strategic football fan.

Professional Experience

Security Researcher - Zeron
Jul 2023 - present
  • Developed Risk Scoring Model for EASM increasing accuracy of the existing model by 80%.
  • Enhanced the EASM core engine, widening attack surface detection by 38%.
  • Designed KPIs, data points, and customer flows for intuitive navigation increasing attention retention from 40% to 60%.
  • Performed penetration testing and red team engagements of over 13 clients.
Research Intern - TeamCognito Solutions Private Limited
Nov 2022 - Jun 2023
  • Took part in penetration testing activities of more than 7 clients with detailed reporting.
  • Developed 37% of the core in the initial phases of External Attack Surface Management (EASM).
Cyber Security Research Intern - IEMLabs
Oct 2022 - Nov 2022
  • Participated in VAPT of 3 clients with detailed professional reporting.
  • Conducted more than 4 security awareness campaigns for government agencies.

Education

2020 - 2023
Bachelor of Computer Applications
Institute of Engineering and Management
GPA: 9.33 out of 10.0

Extracurricular Activities

  • Top 0.6% of batch BCA 2020-2023.
  • Participated in various hackathons and coding competitions.
  • Represented college in various inter-college competitions.

Achievements

  • Stood 7th in Kolkata Police Hackathon 2022.
  • Stood 2nd in IEM Hackathon 2022.
  • Director’s Award for Best Student Contribution batch BCA 2020-2023.

Certifications

Certified Red Team Professional (CRTP)
Red Team Active Directory Privilege Escalation Lateral Movement
Certified Red Team Professional (CRTP)
Issued by Altered Security — Dec 2024
Certified Ethical Hacker (Practical)
Penetration Testing Vulnerability Assessment
Certified Ethical Hacker (Practical)
Issued by EC Council — Aug 2022

Acknowledgements

Multiple Privilege Escalation vulnerabilities in Docker Desktop versions <4.27.0 via DLL Side loading for Windows
Multiple Privilege Escalation vulnerabilities in Docker Desktop versions <4.27.0 via DLL Side loading for Windows
Discovered multiple privilege escalation vulnerabilities in Docker Desktop on versions prior to version 4.27.0 for Windows via DLL Side loading, leading to a successful exploit chain.

Volunteering

Panel Judge at SAP Hackfest 25 organized at Sister Nivedita University
Panel Judge at SAP Hackfest 25 organized at Sister Nivedita University
Honoured to be a panel judge at the SAP Hackfest 25 organized at Sister Nivedita University, where I evaluated innovative projects and solutions.
Session on Protecting Personal Data - Safety and Security Awareness Week 2024
Session on Protecting Personal Data - Safety and Security Awareness Week 2024
Honoured to conduct a session on Protecting Personal Data during the Safety and Security Awareness Week 2024.

Projects

God Genesis
C2 Offensive Security Kitploit CYNET Red Team Tradecraft Post Exploitation Evasion TrTec
God Genesis
A python based Command and Control framework, ranked 5th among the top 7 security tools of 2023 by Offensive Security, is tailored for post-exploitation and evasion tactics. TrTec created tutorials featuring this tool, with sponsorship from CYNET.
SubPDF
Enumeration Subdomain Reconnaissance Domain Extraction External Attack Surface
SubPDF
SubPDF is a sleek, powerful, and user-friendly command-line tool designed to extract domains and subdomains from PDF files with lightning speed
BucketHunter
Cloud Security Cloud Storage Reconnaissance Enumeration External Attack Surface
BucketHunter
BucketHunter is your friendly tool in discovering and analyzing cloud storage buckets! This project makes exploring AWS S3, GCP Storage, Azure Blob, DigitalOcean Spaces, and Alibaba Cloud OSS buckets simple and efficient.

Publications

CVE-2024-39904: High Severity (CVSS 8.8) Code Execution Vulnerability in VNote via Local Path Traversal
CVE-2024-39904: High Severity (CVSS 8.8) Code Execution Vulnerability in VNote via Local Path Traversal
Discovered and fixed a CVSS 8.8 (high) level severity code execution vulnerability in VNote prior to version 3.18.1 caused by local path traversal, enabling arbitrary program execution via crafted file:/// URI links.
Vulnerability Weightage and Prioritization Model: Derived from Real Data and Community Insights
Vulnerability Weightage and Prioritization Model: Derived from Real Data and Community Insights
Developed a dynamic vulnerability prioritization model integrating CVSS, EPSS, CWE, CAPEC, and real-world threat data for accurate risk assessment. Improved vulnerability management by calculating weighted scores based on exploitation trends, advisories, and community-driven intelligence.
Extending the Attack Graph Model: Integrating Reconnaissance Stages
Extending the Attack Graph Model: Integrating Reconnaissance Stages
Extended the NIST Attack Graph Model by integrating reconnaissance phases, enabling more realistic cyber risk quantification.Demonstrated efficacy through a detailed case study, showing improved overall vulnerability metrics and refined attack path modeling.
Vendor PulseGen: Generative Vendor Risk Management Platform
Vendor PulseGen: Generative Vendor Risk Management Platform
Designed and implemented quantitative risk scoring models (QRS, CRS, ESR) for vendor assessment using structured inputs and CVE-based analytics. Enabled explainable, LLM-integrated scoring pipelines without fine-tuning, ensuring privacy-preserving and modular VRM evaluations.
Strengthening Cyber Resilience of Small Businesses in BFSI: A CIA-Driven Strategy for Investment and Risk Management
Strengthening Cyber Resilience of Small Businesses in BFSI: A CIA-Driven Strategy for Investment and Risk Management
Designed and implementated a strategy for investing in Risk Management based on the amount Confidentiality, Integrity and Availability is getting affected in the organization giving an guide for investment based on CIA assessed by the company.

Establishing Reverse Connection...

If you’re reading this, the listener is up.

Drop your payload — questions, ideas, ops chatter — and I’ll catch the callback. No firewalls, no filters.

Just a clean channel between minds.