ABOUT ME

// ACCESS LEVEL: AUTHORIZED
OPERATIVE ID: RV-2025

PROFILE

Hi, I am Rokkam Vamshi (iamaangx028), Security Researcher with expertise in offensive security focusing on vulnerability discovery and exploitation. Completed my graduation in Computer Science and Cybersecurity.

PROFESSIONAL HISTORY

FireCompass

1 yr 2 mos

NOV 2025 - PRESENT

Security Analyst

At FireCompass, I contribute to continuous attack surface discovery and CVE research, focusing on real-world exploitation paths. My work involves analyzing vulnerabilities, building automation scripts, and simulating adversarial behaviors to support proactive red teaming. I help strengthen defenses by mapping and monitoring exposed assets across enterprise environments.

OCT 2024 - NOV 2025

Security Research Intern

At FireCompass, I contribute to continuous attack surface discovery and CVE research, focusing on real-world exploitation paths. My work involves analyzing vulnerabilities, building automation scripts, and simulating adversarial behaviors to support proactive red teaming. I help strengthen defenses by mapping and monitoring exposed assets across enterprise environments.

CybersmithSECURE

7 mos

FEB 2024 - SEP 2024

InfoSec Intern

At CybersmithSECURE, I have worked on numerous projects, utilizing my expertise in penetration testing and vulnerability assessment. Conducted more than 30+ Web, Network, and API Pentest in a limited time frame with custom code alongside my team. During my testing, I have discovered over 50+ Critical and high-severity vulnerabilities, including SQL injections, IDORs, ATOs, unauthorized admin panel access, PII leaks, information disclosure, business logic vulnerabilities, and cross-site scripting...etc

EDUCATION

2021 - 2025

B.Tech in Computer Science and Cybersecurity

Sree Vidyanikethan Engineering College - Notable coursework in Computer Science & Cybersecurity

PRIMARY EXPERTISE:
WebApp Security API Testing Network Pentesting Android Pentesting Cloud Pentesting CTF Competitions Python Scripting Breah and Attack Simulation

RESUME

DOWNLOAD RESUME

Access my Resume here

PDF Document 542KB • Optimized for Viewing
DOCX Document 318KB • Editable Format

PROJECTS

ASM Tool

COMPLETED
ASM Tool Screenshot
ASM TOOL v1.0
CLASSIFICATION: PUBLIC

Domain-based recon engine with subdomain enumeration, deduplication, Nuclei scanning, and results in user friendly dashboard.

TECHNICAL SPECIFICATIONS:
Python | Nuclei | Subfinder | Django

JSRadar

ONGOING
ASM Tool Screenshot
JSRADAR v1.2
CLASSIFICATION: PRIVATE REPO

A powerful JavaScript enumeration and analysis tool for security researchers and penetration testers. Will make it Public once I complete working on it!

TECHNICAL SPECIFICATIONS:
Python | HTML

Personal Password Vault

COMPLETED
ASM Tool Screenshot
VAULT v1.2
CLASSIFICATION: PUBLIC

Lightweight terminal-based password manager with encryption for personal use.

TECHNICAL SPECIFICATIONS:
Python

Burp Traffic Highlighter

COMPLETED
ASM Tool Screenshot
HIGHLIGHTER v1.0
CLASSIFICATION: PUBLIC

A Burpsuite extension that is used to automatically highlight Burp HTTP history with different colors.

TECHNICAL SPECIFICATIONS:
Python | Mod Header Extension

SKILLS

PENETRATION TESTING

Web Application Testing PROFICIENT
85%
API Security Testing ADVANCED
90%
Network Penetration INTERMEDIATE
75%
Android Pentesting INTERMEDIATE
70%

TOOLS MASTERY

90%
Burp Suite
85%
Nmap
80%
Metasploit
85%
Wireshark
88%
Nuclei

CREDENTIALS

ACTIVE CERTIFICATIONS

eJPT
ID: RV-CERT-001
CLEARANCE: LEVEL 3

eJPTv2 - Junior Penetration Tester

eLearnSecurity ISSUED: OCT.2023 STATUS: ACTIVE

Practical certification demonstrating hands-on penetration testing skills and methodology. Covers network attacks, web application testing, and system exploitation.

API
ID: RV-CERT-002
CLEARANCE: LEVEL 2

API Security Fundamentals

APIsec University ISSUED: DEC.2023 STATUS: ACTIVE

Specialized training in API security testing, vulnerability assessment, and remediation strategies. Focuses on OWASP API Top 10 security risks.

API
ID: RV-CERT-003
CLEARANCE: LEVEL 2

PT1

TryHackMe ISSUED: Aug.2025 STATUS: ACTIVE

A deep dive into WebApp, Network and AD security testing and remediation. It was a 100% hands-on practical exam based certification with custom report template. It covers various penetration testing methodologies and real-world scenarios.

SECURITY HALL OF FAME

STATS

80+
ORGANIZATIONS
VERIFIED
25+
VAPTs (During Internship)
TOP 100
NCIIPC-AICTE PENTATHON

ORGANIZATIONS SECURED

ACCENTURE
CISCO
SONY
PANASONIC
XTRM
U.K. MINISTRY OF DEFENSE
U.S. DEPARTMENT OF EDUCATION
UNI-MARBURG
JIO
PATYM
TATAPLAY
GEA
DUTCH RESEARCH COUNCIL
GEEKSFORGEEKS
SONY
ACHMEA
DECKO

LETTERS OF APPRECIATION

Letter of Appreciation from Axway
A

Axway

ISSUED: JUL.2023 JENKINS SERVER

Thank you for responsibly disclosing the information leakage finding on one of our Jenkins servers. We appreciate the professional manner in which the issue was reported.

Sandy Blackwell Global Director Software Security
Letter of Appreciation from US Department of Education
U

US Department of Education

ISSUED: MAR.2023 WEB PORTAL

We extend our gratitude for your responsible disclosure of critical security vulnerabilities in our web portal. Your expertise helped protect sensitive educational data.

Security Response Team US Department of Education
Letter of Appreciation from Philipps-Universität Marburg
U

Uni-Marburg

ISSUED: SEP.2023 AUTH BYPASS

Thank you for identifying and reporting the authentication bypass vulnerability in our research portal. Your contribution has significantly improved our security posture.

IT Security Department Philipps-Universität Marburg
Letter of Appreciation from Panasonic
P

Panasonic

ISSUED: JAN.2024 SSRF VULN

We appreciate your responsible disclosure of the SSRF vulnerability in our internal API. Your detailed report allowed us to quickly remediate the issue.

Security Operations Center Panasonic Corporation
Letter of Appreciation from GEEKSFORGEEKS
D

GEEKSFORGEEKS

ISSUED: Mar.2025 Blind XSS in Support Portal

Thank you for your diligent effort in identifying and responsibly reporting the Blind XSS vulnerability in our Support Portal.

Vulnerability Disclosure Program GEEKSFORGEEKS
Letter of Appreciation from RUS-CERT
C

RUS-CERT

ISSUED: Jul.2023 Blind XSS in Support Form

You helped us in improving IT security at our University

IT Security Team University Stuttgart RUS-CERT
Axway Letter Thumbnail
AXWAY
US Dept of Education Letter Thumbnail
US DEPT EDU
Uni-Marburg Letter Thumbnail
UNI-MARBURG
Panasonic Letter Thumbnail
PANASONIC
US DoD Letter Thumbnail
US DOD
Cisco Letter Thumbnail
CISCO

BLOGS

FILTER BY CLASSIFICATION:
VULNERABILITY DISCLOSURE
ID: RV-INT-24-022

Exploiting Django Debug Mode for Unrestricted Access

February 12, 2024
6 min read
Severity: High

A detailed writeup on how Django's debug mode can be exploited to gain unrestricted access to internal dashboards and sensitive information.

Django Web App Debug Mode Authentication Bypass
RECON TECHNIQUES
ID: RV-INT-24-009

Using Shodan to Find and Exploit Open Jenkins Instances

January 18, 2024
7 min read
Severity: Medium

Guide to utilizing Shodan for identifying exposed Jenkins instances and the security implications of these findings.

Shodan Jenkins OSINT Reconnaissance

INTERACTIVE CYBER INTELLIGENCE HUB



Beyond these featured reports, explore my comprehensive weekly cybersecurity learning journey. Each blog post is presented in an interactive, node-based format for enhanced engagement and deeper understanding.

16
WEEKLY BLOGS
SELF PACED
MODE
ENTER CYBER INTELLIGENCE HUB 🚀
CLEARANCE LEVEL: INTERACTIVE-MODE | LEARN AT YOUR OWN PACE

EVENTS & CONFERENCES

2025

BSides Vizag

Ahmedabad

Bug Bounty Events Networking
2024

BSides Ahmedabad

Ahmedabad

Got a chance to meet the great minds of Cybersecurity. Thanks to Yassine Aboukir 🐐 for the entry Pass.

Bug Bounty Events Networking
2024

NCIIPC AICTE Pentathon 2024

New Delhi

NCIIPC AICTE Pentathon 2024 Finalist. Attended my first ever offline CTF challenge. It was a fun and great learning experience.

Web Security CTF Top 100

CONTACT ME

GET IN TOUCH

1
ONLINE
READY
SECURE
🛰️ Warming up ...
QUICK ACCESS PROTOCOLS