root@assad:~

$ initializing system...

$ loading security modules...

$ establishing secure connection...

$ decrypting portfolio data...

[✓] ACCESS GRANTED

ESC
👤 Go to About
🎯 Go to Skills
💼 Go to Experience
🚀 Go to Projects
📜 Go to Certifications
✉️ Go to Contact
⟨/⟩ Open GitHub
in Open LinkedIn
Download Resume
Back to Top
About Skills Experience Projects Certs Contact ↓ Download Resume
Available for Opportunities

Hello, I'm Mohammed Assad

$ |

Cybersecurity practitioner & CTF developer specializing in SOC, Purple Teaming, Cryptography, and Steganography.

0 + Students Trained
0 + Projects Built
Top 0 % TryHackMe
assad@kali:~

$ whoami

mohammed_assad

$ cat skills.txt

VAPT | SOC | Cryptography | Steganography | Reverse Engineering

$ nmap -sV portfolio.assad

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

443/tcp open https

$ _

Scroll Down

About Me

Mohammed Assad
Online
📍 Bengaluru, India
🎓 BCA Student
🏆 Top 5% CTF

I'm a cybersecurity practitioner and CTF developer currently pursuing my Bachelor of Computer Applications at Yenepoya University, Bengaluru.

I specialize in SOC analysis, Purple Teaming, cryptography, and steganography. I actively contribute to community learning, tool building, and competitive security environments.

As a core member of Team Triada, I design multi-category CTF challenges and build competition environments. I've also trained 80+ students in Linux fundamentals and CTF domains from scratch through YenShield.

🔐

Security Research

VAPT, Threat Hunting & Analysis

🏁

CTF Development

Multi-category challenge design

🛠️

Tool Building

Published security tools globally

Technical Arsenal

🎯

Security Domains

VAPT
SOC Analysis
Threat Hunting
Threat Analysis
Cryptography
Steganography
Reverse Engineering
🔧

Tools & Platforms

🕷️ Burp Suite
🦈 Wireshark
📡 Nmap
💉 Metasploit
📱 Apktool
👻 Ghidra
🐱 Netcat
🔓 Hashcat
📊 Splunk
🔍 Suricata
🐉 Kali Linux

Experience

Internship

TCS iON Internship

3 Months
  • Completed structured industry training in enterprise cybersecurity practices
  • Gained exposure to SOC processes, monitoring, and investigation workflows
2024 – Present

Team Member & Challenge Developer — Team Triada

  • Designed and supported multi-category CTF challenges
  • Assisted in building CTF lab and Hosted CTF competitions
2024 – Present

Cybersecurity Team Member — YenShield

  • Trained 80+ students in Linux fundamentals and CTF domains from scratch
Community

NULL Community & Cybersecurity Conferences

  • Regular attendee of NULL meetups and major cybersecurity conferences

Projects

🛡️
Complete

SOC Automation Toolkit

Full-Stack SOC Pipeline

Comprehensive Python-based SOC automation suite — multi-format log parsing (Syslog/JSON/CSV/CEF), anomaly detection with rule engine, threat intelligence enrichment (OTX & AbuseIPDB), automated incident response with playbooks, and HTML report generation.

Python SIEM Threat Intel Log Parsing Anomaly Detection SOAR
🔏
Published

CRIPSTEGZ

Cryptography & Steganography Tool

Supports encryption, decryption, and hidden-data workflows. Published for global usage via Python packaging.

Python Cryptography Steganography PyPI
🏁
Complete

Triada Labs

CTF Platform

Co-built a structured platform for hosting competitive cybersecurity challenges with multi-category support.

Platform CTF Labs
📡
Complete 1st Place

Wi-Fi Deauth Device

IoT Security Tool

Built an ESP8266-based device for authorized wireless testing. Received Class 1st recognition for this project.

ESP8266 IoT WiFi Hardware

Certifications

🏆 Achievements

Top 1%

Across major CTF competitions

Top 5%

TryHackMe global ranking

Global

Published crypto-stego tool

1st

Wi-Fi Deauth IoT — College Event

TryHackMe Profile

Education

2023 – Present

Bachelor of Computer Applications (BCA)

Yenepoya University, Bengaluru

2023

12th Grade

Aurobindo PU College

2020

10th Grade

Narayana E-Techno School

Get in Touch

Let's Connect

Whether you want to collaborate on a security project, need CTF challenges developed, or just want to chat about cybersecurity — I'm always open to connecting.

contact@assad:~