Skip to content
View roshanbl's full-sized avatar
🏠
Working from home
🏠
Working from home

Organizations

@ExploitX-org @ExoQuest

Block or report roshanbl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
roshanbl/README.md

Hi there 👋, I'm BL Roshan

🔒 Cybersecurity Enthusiast | Ethical Hacker | Security Researcher

Typing SVG


🛡️ About Me

I'm a passionate cybersecurity enthusiast dedicated to understanding and improving digital security. I enjoy exploring vulnerabilities, understanding attack vectors, and developing defensive strategies. I'm constantly learning and participating in CTF challenges to enhance my skills.

🔧 Tech Stack & Tools

💻 Programming & Scripting

Python C JavaScript

🔐 Security Tools

Wireshark Metasploit Burp Suite Nmap

🛠️ Platforms & OS

Kali Linux Linux Windows VMware

🎯 Areas of Interest

  • 🔓 Penetration Testing - Network, Web Application, and Wireless Security
  • 🦠 Malware Analysis - Reverse Engineering & Behavioral Analysis
  • 📡 Network Security - Traffic Analysis & Intrusion Detection
  • 🔍 Digital Forensics - Incident Response & Evidence Collection
  • 📜 Security Automation - Python Scripts for Security Tasks
  • 🏴 CTF Competitions - Capture The Flag Challenges
  • 🌐 Web Application Security - OWASP Top 10 Vulnerabilities
  • 🔑 Cryptography - Encryption & Cryptanalysis

📚 Learning Resources I Use

🏆 Certifications

  • Google Cybersecurity Professional Certification – Coursera & Google
  • Cisco Ethical Hacker – Cisco Networking Academy
  • Introduction To Cybersecurity – Cisco Networking Academy
  • Vulnerability Assessment and Penetration Testing – Alison
  • Ethical Hacking – Great Learning Academy
  • Securing MongoDB Atlas: Authentication & Authorization – MongoDB
  • Securing MongoDB Self-Managed: Authentication & Authorization – MongoDB

📫 Let's Connect


⚡Expertise

I've solved over 100+ CTF challenges and used 20+ security tools!

💻 "The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." - Gene Spafford

Popular repositories Loading

  1. wifi-impoersonation-detector-attack-defender wifi-impoersonation-detector-attack-defender Public

    Forked from Osama-web-dev/wifi-impoersonation-detector-attack-defender

    Developed a detection and mitigation system to identify rogue APs, evil-twin attacks, and common Wi-Fi exploitation techniques using passive scanning and active verification.

    JavaScript 1

  2. face-recognition-app face-recognition-app Public

    1 2

  3. India-Accelerator-OpenXAI-2025 India-Accelerator-OpenXAI-2025 Public

    Forked from blockseblock-labs/India-Accelerator-OpenXAI-2025

    TypeScript

  4. roshanbl roshanbl Public

    Hello this is my profile