🎓 B.Tech in Computer Science (Cybersecurity)
🔐 Cybersecurity Enthusiast | Bug Hunter (in progress) | OSINT & Recon Lover
🧠 Learning every day, breaking things the ethical way
💻 Currently building tools, testing exploits, and contributing to open-source
- 🕵️♂️ I’m diving deep into the world of offensive security
- 🛠️ Actively exploring bug bounty, red teaming, and network exploitation
- 📡 Passionate about OSINT, web app security, and CTFs
- 🧰 Tools I’ve used or contributed to:
nikto,metasploit,nessus,nmap,Burp Suite,Wireshark - 🧪 Currently experimenting with automation & scripting in Python/Bash
Here you'll find:
- 🔍 OSINT & recon tools/scripts
- ⚙️ Automation for bug bounty & recon workflows
- 📊 Learning repos for TryHackMe / HTB / LeetCode
- 🧪 Custom payloads, cheat sheets & more
HeaderHunter Pro is a cybersecurity-focused web application that scans websites for critical security headers, explains the risks of missing headers, and provides real-world configuration fixes.
Whether you're a developer, security engineer, or ethical hacker — this tool gives you an instant look at a website’s HTTP defense posture.
Link: https://utkarsh-404.github.io/HeaderHunter
Advanced OSINT Reconnaissance Web Application A modular, beginner-friendly, and powerful toolkit for cybersecurity professionals, bug bounty hunters, and researchers.
Features: 🔎 Subdomain Enumeration (via Sublist3r) 🌐 Network Scanning (via Nmap) 📄 WHOIS Lookup (via python-whois) 📧 Email Harvesting (via theHarvester) 🧠 Technology Detection (via WhatWeb) 📍 IP Geolocation (via IP-API) 🔐 Breach Check (via Breach-Checker) 🧬 Malware Scan (via VirusTotal API)
Developed a secure web application with an integrated proxy acting as a basic WAF (Web Application Firewall). Hosted the main application on port 5000 and the proxy on port 5001. All traffic is routed through the proxy, allowing logging and security enforcement.
Key Highlights:
- Input validation and sanitization against XSS, SQLi, and injection attempts
- Custom-built proxy server for traffic filtering
- Traffic logs for security auditing
- Enforces secure coding best practices
Stay tuned — more tools and writeups are coming! Checkout My Blog: https://ultrahacktalks.blogspot.com/
- 🧠 A long-term project:
VantaMind– an app for gamified reading & personal growth - 🧪 Personal TTP Lab for attack simulation
- 🧰 Curated Cybersecurity Roadmap & Resources (free for everyone)
"Learn. Break. Build. Repeat."
Open for collaborations, security research, and anything that makes the internet a little safer (or more fun to hack responsibly).

