Skip to content
View ascend-x's full-sized avatar
:electron:
Debugging
:electron:
Debugging

Highlights

  • Pro

Block or report ascend-x

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ascend-x/README.md
Typing SVG

Header

Hi, I'm Nandakishore

Cybersecurity Engineer | CTF Player | Cloud Security Enthusiast


💀 cat /etc/about_me.conf

ascend-x@github:~$ whoami
Nandakishore V

ascend-x@github:~$ uname -a
Linux kali 6.x.x-security #CTF-ready

ascend-x@github:~$ echo $SKILLS
"Breaking things responsibly since 2024"

ascend-x@github:~$ ▋
[MISSION_OBJECTIVE]
Target          = "Cybersecurity Engineer"
Focus           = "Cloud Security, Pentesting & DevSecOps"
Current_Status  = "Learning, Breaking, Fixing, Repeating"

[SKILL_TREE]
Programming     = ["Python", "C", "C++", "JavaScript", "TypeScript", "Bash"]
Web_Tech        = ["HTML", "CSS", "ReactJS", "Node.js", "Express.js"]
Databases       = ["MongoDB", "MySQL"]

[SECURITY_STACK]
Pentesting      = ["Burp Suite", "Nmap", "sqlmap", "Hydra", "John the Ripper"]
Reverse_Eng     = ["Ghidra", "GDB"]
Networking      = ["Wireshark", "TCP/IP", "DNS", "HTTP"]
Cloud           = ["Google Cloud Platform", "Docker", "GitHub"]

[LINUX_LIFESTYLE]
Distros         = ["Kali Linux", "Ubuntu", "Arch (when feeling brave)"]
Daily_Routine   = "Scan -> Exploit -> Get stuck -> Learn -> Win"
🧪 ascend-x@ctf-lab:~$ ./status
User        : ASCEND_X
Role        : Cybersecurity Student / CTF Player
Environment : Linux | Cloud | Browser Tabs (Too Many)
Focus       : Web Exploitation, Cryptography, RE, Cloud Basics
Location    : India
Clearance   : Student Red Team (Coffee Powered)
class CyberSecurityEngineer:
    def __init__(self):
        self.name = "Nandakishore V"
        self.languages = ["Python", "C", "C++", "JavaScript", "Bash"]
        self.tools = [
            "Burp Suite", "Nmap", "Wireshark",
            "sqlmap", "Ghidra", "Docker"
        ]
        self.platforms = ["TryHackMe", "Hack The Box"]

    def current_focus(self):
        return [
            "Web Application Security",
            "CTF Challenges & Writeups",
            "Cloud Security (GCP)",
            "Linux Internals",
            "Breaking things without breaking laws"
        ]

    def exploit_status(self):
        return "Still hacking. Still learning. Still caffeinated."

🧠 Mission Log

Protocol Description Status
CTF Practice TryHackMe & Hack The Box challenges ACTIVE
Web Pentesting OWASP Top 10 & lab exploitation IN_PROGRESS
Cloud Learning GCP labs & security fundamentals ACTIVE
Cyber Projects Security tools & dashboards DEPLOYED
Portfolio Retro hacker-themed website LIVE
Sleep Cycle Undefined behavior SEGFAULT

📊 Status Graph


Pinned Loading

  1. PhishGuard-AI PhishGuard-AI Public

    PhishGuard AI uses advanced machine learning to detect and block phishing emails, links, and attachments in real time – keeping users and businesses safe from evolving cyber threats.

    JavaScript 2 1

  2. portfolio portfolio Public

    TypeScript 1

  3. QuizWiz QuizWiz Public

    JavaScript 1

  4. care-x care-x Public

    Forked from snbhowmik/care-x

    TypeScript

  5. QAVACH QAVACH Public

    Forked from snbhowmik/QAVACH

    QAVACH is a post-quantum cryptography (PQC) identity and document verification platform for Indian e-governance. It demonstrates how government services can issue, store, and verify citizen credent…

    TypeScript 1

  6. ot-incident-defender ot-incident-defender Public

    An OpenEnv environment simulating real-world ICS/OT cybersecurity incidents. AI agents act as SCADA operators to detect, mitigate, and log cyberattacks modeled on historic physical infrastructure b…

    Python 1