BSc IT student who builds real tools — from web vulnerability scanners to sleek task managers. I write clean code, break things on purpose, and put them back together better.
I'm Aditya Singh — a third-year BSc IT student who loves building things that actually work. From crafting clean, animated front-ends to writing Python security tools that crawl and scan live websites, I'm drawn to projects where code meets real-world impact. When I'm not building, I'm learning — exploring ethical hacking, system design, and everything in between.
BSc Information Technology — 3rd Year
Web Development & Security Tooling
Ethical Hacking & Penetration Testing
System Design & Advanced Algorithms
Data Structures
Linux Admin
Networking
Web Security
A Python-based modular web vulnerability scanner built for security researchers. Crawls target sites and detects SQLi, XSS, open redirects, directory traversal, sensitive file exposure, misconfigured headers, and SSL/TLS weaknesses — complete with detailed exploitation steps and HTML/JSON reports.
# WebVulnScan - Security Scanner
from modules import sqli, xss, headers
from modules import ssl_check, redirect
def run_scan(target_url):
crawler = Crawler(target_url)
crawl_data = crawler.crawl()
findings = []
findings += sqli.scan(crawl_data)
findings += xss.scan(crawl_data)
findings += headers.scan(crawl_data)
findings += ssl_check.scan(crawl_data)
generate_report(findings)
return findings
A beautifully designed task manager with priority levels, due dates, drag & drop reordering, real-time search, dark/light theme, and keyboard shortcuts. Pure vanilla HTML/CSS/JS.
Fundamentals of C++ including OOP, memory management, and data structures.
Stored procedures, triggers, and advanced SQL queries using Oracle PL/SQL.
Statistical computing and data visualization using R and ggplot2.
TCP/IP protocols, OSI model, subnetting, and network architecture fundamentals.
Configuring and managing Ubuntu servers, services, and network infrastructure.
Exploitation techniques, Linux server attacks, and penetration testing methodology.
Complete guide to Kali Linux tools, environment setup, and security workflows.
Core concepts of cybersecurity — threats, vulnerabilities, and defense strategies.
Hardware components, CPU architecture, memory hierarchy, and I/O systems.
I'm open to internships, freelance projects, collaborations, or just a good tech conversation. Drop me a message and I'll get back to you.