Sonu Kumar Cyber Profile
bash - root@sonu: ~
root@sonu:~# cat profile.txt

NAME: Sonu Kumar
ROLE: Offensive Security Specialist / Red Team Ops
LOC : Kathmandu, Nepal

> Highly motivated cybersecurity professional specializing in identifying vulnerabilities and securing infrastructure.
> Currently analyzing network packets and breaking systems legally.

root@sonu:~# _

> SYSTEM_METRICS

VULNERABILITY_ASSESSMENT[95%]
NETWORKING (VLAN, OSPF, BGP)[92%]
OSINT_&_RECONNAISSANCE[88%]
PYTHON_AUTOMATION[90%]

> EXPLOITS_&_TOOLS

WHOIS Threat Analyzer

Cybersecurity OSINT tool for automated domain risk scoring and footprinting.

AI Traffic Monitoring

YOLO & OpenCV based violation detection system operating in real-time.

Network Mapper Automation

Python script leveraging Nmap for rapid sub-network discovery and vulnerability tagging.

Custom XSS Payload Generator

Dynamic tool to generate polymorphic XSS vectors for WAF bypass testing.

Fire Fighting Robot

Embedded Arduino system with infrared thermal response and autonomous navigation.

Form Auto-Filler

Bulk document automation written in Python, interfacing with Excel datasets.

> OPERATION_LOGS

[2025-09 TO 2025-12]

L2 Network Support Engineer @ WebSurfer

Handled escalated network incidents for one of Nepal's largest ISPs. Resolved complex routing anomalies, DHCP exhaustion events, and fiber outages.

INCIDENT_REPORT #BGP-442: Diagnosed a flapping BGP peering session that caused intermittent connectivity for a major hospital group. Coordinated with the NOC to apply dampening policies, restoring stability within 22 minutes.
[2022-01 TO PRESENT]

Offensive Security Researcher

Independent vulnerability research and CTF participation. Ranked in the Top 1% globally on TryHackMe.

FOCUS_AREAS: Active Directory exploitation, Privilege Escalation, Web Application Security, and Cloud-native attack surfaces (AWS IAM, S3 misconfigs).

> CERTIFICATES.DAT

> INITIATE_HANDSHAKE

secure_channel.sh

> Secure communications channel open. Awaiting payload...

NAME=
EMAIL=
MSG=