Skip to main content
About Me — Kasyap Girijan

About Me — Kasyap Girijan

396 words·2 mins· loading · loading ·
Kasyap Girijan
Author
Kasyap Girijan
Breaking networks, automating systems, and exploring the logic behind machines
Table of Contents

Hi, Kasyap here
#

I’m a cybersecurity practitioner and technology explorer - curious about how systems really work beneath all the abstractions. I love dissecting networks, applications, APIs, and automations to understand their internals, uncover weaknesses, and engineer better defenses.

My experience spans network security, vulnerability & threat management, internal pentesting, automation engineering, and security analytics.
A big part of my work revolves around crafting scripts, pipelines, and dashboards that reduce manual effort and increase clarity for security teams.

When I’m not building or securing systems, you’ll find me in labs, exploring vulnerable environments, studying exploit chains, or experimenting with defensive Python to detect anomalies.


Why I Built This Space
#

This site is my personal knowledge base — a place to document what I learn, break, fix, and explore.

You’ll find:

  • CTF walkthroughs & practical attack scenarios
  • Write-ups on vulnerabilities, techniques, and tools
  • Notes from labs, experiments, and research
  • Automation ideas & security engineering workflows
  • Deep dives into protocols, internals, and system behavior

Writing helps me stay sharp. Sharing helps others grow — and pushes me to explore further.


What Drives Me
#

I believe in learning by breaking, questioning assumptions, and exploring tech beyond the surface level. Security for me is a blend of:

  • Hands-on experimentation
  • Clear documentation & reproducible workflows
  • Continuous improvement
  • Automation-first thinking
  • Curiosity beyond comfort zones

The thrill is in understanding why something works — and how it can fail.


Skills & Tools
#

Core Security Domains
#

  • Vulnerability & Threat Management
  • Internal Network Pentesting
  • Web Application Security
  • Patch Management & Hardening
  • Security Automation & Dashboards
  • SIEM / Log Analysis

Tools I Use
#

Offensive:
nmap · Burp Suite · ffuf · sqlmap · nikto · gobuster
Metasploit · Responder · BloodHound

Vulnerability Management:
Rapid7 · Greenbone OpenVAS · Tenable Nessus

Defensive / Monitoring:
Splunk · Elastic · Wazuh · Tuffin

Automation / Scripting:
Python · Bash · PowerShell
API automation (RiskRecon, Splunk, Proofpoint, internal tooling)

Infrastructure & Platforms:
Docker · Linux · Windows Server
Hugo · Cloudflare Pages · Git

Always Exploring
#

CTFs · Exploit dev basics · Network protocols · Cloud security · Anomaly detection

7h3h0und


Beyond Work
#

When I’m not buried in logs or exploit chains, I’m usually experimenting with photography, gaming, riding, or cooking on weekends. I love working on projects that mix creativity with logic — whether it’s building dashboards, editing videos, or optimizing workflows.