I am a passionate Cybersecurity student, eager to utilize my skills and knowledge to help organizations protect their critical assets from evolving threats. With a strong foundation in network security and risk assessment, I am well-equipped to contribute to a team's mission of securing digital infrastructures. I am always seeking new learning opportunities and staying up-to-date with the latest industry trends to enhance my abilities.
Welcome to my portfolio! I’m Dharmendra Kumar (also known as dharmendrastm), a cybersecurity enthusiast, junior penetration tester, and ethical hacker. I am eJPT v2 certified and actively involved in Vulnerability Assessment and Penetration Testing (VAPT), with a strong focus on web application security. I continuously improve my skills by working on real-world attack scenarios, practicing on platforms like Hack The Box and TryHackMe, and participating in Capture The Flag (CTF) challenges. I have hands-on experience with tools such as Burp Suite, Nmap, Metasploit, Wireshark, and OWASP Top 10 testing methodologies. I also use Python and C for automation and security research. My work focuses on identifying security vulnerabilities, understanding how attackers exploit systems, and helping organizations strengthen their security posture. I have also been recognized in multiple responsible disclosure programs, including: • NASA Vulnerability Disclosure Program – Hall of Fame • Ulta Beauty Security Program – Hall of Fame • Dreamscape Security Program – Hall of Fame Cybersecurity is not just a profession for me — it’s a passion. I enjoy solving complex security challenges, learning new technologies, and contributing to a safer digital world. Let’s connect and work together to build a more secure internet. 🔐
We deliver top-tier security solutions to safeguard your company
Web application penetration testing (pentesting) is a simulated attack on a web application to uncover security vulnerabilities before malicious actors can exploit them. This proactive approach helps organizations identify weaknesses, protect sensitive data, and ensure business continuity.
Internet of Things (IoT) penetration testing is a security evaluation process that involves simulating attacks on IoT devices and systems to identify vulnerabilities and weaknesses. As IoT devices become increasingly prevalent in both consumer and industrial applications, their security has become a critical concern. IoT pentesting helps organizations uncover potential security issues before malicious actors can exploit them
Network penetration testing, or pen testing, is a cybersecurity practice that involves simulating cyberattacks on a network to identify potential vulnerabilities. The goal of network penetration testing is to find and fix security gaps before a real attack occurs
Android Penetration Testing is the process of assessing the security posture of Android applications and devices to identify vulnerabilities that could be exploited by malicious attackers.
Security training and awareness involve educating employees and stakeholders about cybersecurity risks and best practices to enhance an organization's overall security posture. The goal is to build a culture of security where everyone is informed and vigilant against potential threats.
Vulnerability assessment is a systematic process used to identify, evaluate, and prioritize vulnerabilities within an organization’s IT infrastructure. The aim is to uncover weaknesses that could be exploited by attackers, allowing for timely remediation and enhanced security.
We deliver top-tier security solutions to safeguard your company
We deliver top-tier security solutions to safeguard your company
We deliver top-tier security solutions to safeguard your company
We deliver top-tier security solutions to safeguard your company
As the digital world continues to expand, the importance of secure coding practices cannot be overstated. Developers are the first line of defense against cyber threats, and the code they write can either make systems vulnerable or secure. Insecure code can lead to catastrophic breaches, data leaks, and financial losses.
Read More
Cyber threats are constantly evolving, and staying ahead of attackers is a significant challenge for businesses and individuals alike. From ransomware to Advanced Persistent Threats (APTs), understanding the landscape of cyber threats is crucial for building effective defenses.
Read More
Ethical hacking, or penetration testing, involves simulating cyberattacks on systems, networks, or applications to identify vulnerabilities before malicious hackers can exploit them. It's an essential part of the cybersecurity landscape and helps organizations protect their digital assets.
Read MoreWe deliver top-tier security solutions to safeguard your company
I built a smart system that watches over Internet of Things (IoT) devices (like smart bulbs or cameras) and alerts users if anything suspicious happens — like unexpected network activity. It works in real time and even shows live alerts on a dashboard so people can take action immediately.
I created a tool that helps ethical hackers find vulnerabilities on websites faster. It automates the process of collecting information about a target (like subdomains, hidden files, and endpoints), which is the first and most important step in ethical hacking and bug hunting.
I created a tool that scans websites to find common security weaknesses like SQL Injection and Cross-Site Scripting (XSS). It helps developers secure their web apps by pointing out the risky areas before hackers can find them.
We deliver top-tier security solutions to safeguard your company