Sanjay Chakraborty

Cybersecurity Analyst | Network Security | OSINT Research

Cybersecurity enthusiast with a strong focus on Network Security and OSINT Research. Skilled in identifying vulnerabilities and applying hands-on solutions, driven to strengthen digital security while expanding expertise through practical projects and certifications.

About Me

Cybersecurity enthusiast with a strong focus on Network Security and OSINT Research. Skilled in identifying vulnerabilities and applying hands-on solutions, driven to strengthen digital security while expanding expertise through practical projects and certifications.

Currently pursuing my Diploma in Cybersecurity and ethical hacking, I am constantly expanding my knowledge and skills in the rapidly evolving field of Cybersecurity.

cybersanjay@yahoo.com
+91 98049 99587
West Bengal, India

My Skills

Security

Cybersecurity
VAPT
Ethical Hacking
OSINT
Network Security

Programming & Scripting

Bash
PowerShell
Python
React
HTML
CSS
JavaScript

Tools & Technologies

Nmap
Wireshark
Metasploit
Burp Suite
John the Ripper
Hydra
SET
GitHub

Projects

ShadowHash

All in One Crypto Solution with a self-developed ShadowHash Algorithm, offering encryption, breach detection, password generation, hash creation, comparison and malware scanning across 28 webpages.

Java HTML CSS JavaScript

SecureKeyGen

Robust cryptographic key generator built in Java, utilizing PBKDF2, XOR operations, and multi-layered encryption (AES, 3DES, Blowfish) to generate secure, unpredictable keys for encryption.

Java Cryptography Security

PixelPhantomX

Adversarial image obfuscation tool that generates ghost images using noise injection, edge distortion, metadata poisoning, and watermarking to prevent unauthorized use in AI training.

Python Computer Vision AI Security

SteganoX

A steganography tool enabling users to hide and extract secret messages from images, featuring command-line interface, interactive mode, and lightweight encoding/decoding. Available on PyPI.

Python Steganography PyPI

ShadowShell

Python-based reverse shell for ethical hacking and penetration testing, offering persistence, keylogging, screenshot capture, file transfer, and stealth remote control over compromised systems.

Python Steganography PyPI

AWS-ScriptEngine

A collection of Bash and PowerShell scripts for automating AWS tasks, including CLI setup, S3, EC2, and DynamoDB management, streamlining cloud operations for Linux and Windows users.

PowerShell Bash AWS

AWSxTerra

Terraform scripts for deploying Amazon Linux 2023 and Windows Server 2019 instances on AWS, ensuring Free Tier eligibility with automated security groups, key pairs, storage setup, and web server configurations.

Terraform HCL PowerShell Bash

Port Scanner

Python-based port scanner that detects open ports on single or multiple IPs, supports custom port ranges, uses socket timeouts for efficiency, and provides color-coded output.

Python Network Security Socket Programming

Experience

Cybersecurity Internship

CyberZero

Cybersecurity Council
Jan 2025 – Mar 2025
  • Gained practical exposure to vulnerability assessment and penetration testing (VAPT) through guided lab exercises.
  • Worked with network scanning, enumeration, and analysis tools in simulated environments to identify security gaps.
  • Explored OSINT (Open-Source Intelligence) techniques for gathering actionable security insights.
  • Applied cybersecurity concepts in virtual attack-defense scenarios to strengthen problem-solving skills.
  • Enhanced understanding of risk assessment, incident handling, and security best practices.

Education

Diploma in Cyber Security

IEMA Research & Development Pvt. Ltd. - IEMLabs

2024 – 2026

BSc in Zoology (Hons.)

West Bengal State University (WBSU)

2019 – 2022

Class XII

WBCHSE

2019

Class X

WBBSE

2017

Certifications

Certified Ethical Hacker (CEH)

In Progress

EC-Council

Certified Python Developer (CPD)

IEMLabs

Cisco Certified Network Associate (CCNARS)

IEMLabs

Certified Full Stack Web Developer (CWD)

IEMLabs

Cybersecurity Basic Concept

WEBEL

AZ-400

CloudThat

Cybersecurity for businesses

EC-Council

Achievements

Hands-on Cybersecurity Labs

Completed multiple real-world attack-defense scenarios on TryHackMe and VulnHub, improving skills in penetration testing, network security, and OSINT research.

Active Learning in Cybersecurity

Regularly practicing in CTF-style challenges and simulated environments to strengthen problem-solving and vulnerability assessment techniques.

Practical Exposure to Security Tools

Worked with tools like Nmap, Wireshark, Burp Suite, and Metasploit in lab environments to understand vulnerability scanning, traffic analysis, and exploitation basics.

OSINT Research Practice

Applied open-source intelligence (OSINT) techniques to gather and analyze information from public sources, strengthening investigative and analytical skills.

Networking & Security Fundamentals

Built a strong foundation in network protocols, system security, and vulnerability assessment, applying concepts in simulated lab environments.

Trainings & Courses

Forage Cybersecurity Job Simulator

  • MasterCard
  • TCS

TryHackMe Security Paths

  • Network Security
  • OSINT Research
  • Vulnerability Assessment

AZ-400: Designing and Implementing Microsoft DevOps Solutions (CloudThat)

  • Specialized training in DevOps practices, CI/CD pipelines, infrastructure as code, and secure software delivery on Azure

Cisco NetAcad

  • CCNA

EC-Council CodeRed

  • Top 100 Interesting Bugs
  • Getting Started with IoT Security
  • Introduction to Web Forensics
  • Cybersecurity: Cloud Security

Article

Pixel Poisoning: Hacking Generative AI

Pixel Poisoning: Hacking Generative AI

A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.

Read on Medium
Pixel Poisoning: Hacking Generative AI

SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAP

Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.

Read on Medium
Pixel Poisoning: Hacking Generative AI

The Art of Wi-Fi Hacking & Protection with Aircrack-ng

A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.

Read on Medium
View All Posts on Medium

Get In Touch

Email

cybersanjay@yahoo.com

Phone

+91 98049 99587

LinkedIn

Connect with me