Iβm a Cybersecurity Graduate Student at George Mason University, currently based in Fairfax, VA, with a deep interest in offensive security, digital forensics, and cyber threat research. I thrive on breaking down complex systems, analyzing vulnerabilities, and building secure solutions that make an impact.
- π Specializing in Penetration Testing, Reverse Engineering, Digital Forensics, Cloud Security, and Memory Forensics
- π§ Selected Finalist in the INCS-COE C2C CTF 2025, showcasing strengths in cryptography, binary exploitation, steganography, and forensics
- π Hands-on experience with tools like IDA Pro, Burp Suite, Wireshark, Metasploit, Volatility, Autopsy, and CyberChef
- π οΈ Conducted extensive analysis of hard disk and SD card images, including IAT reconstruction, encrypted file recovery, and timeline analysis
- π‘ Proficient in network packet inspection, Auditd/syslog logging, IP & MAC spoofing, and TLS vulnerability testing
- π― Strong in scripting and automation with Python, Bash, and PowerShell for forensic workflows and offensive security tasks
- π§βπ« Serving as a Graduate Teaching Assistant (GTA) for:
- CYSE 230: Computer Networking Fundamentals
- CYSE 445/450: Offensive Security & Pentesting Labs
- CYSE 470: Human Factors and Cyber Security Engineering.
π I'm passionate about contributing to CTFs, collaborating on security research, and exploring new challenges in the world of ethical hacking and cybersecurity.
-
Research Assistant @ Mason Living Innovation Lab, George Mason University (Summer 2025 β Present)
Conducting embedded hardware security research focused on Cyber-Physical Systems (CPS) and industrial automation environments.
Performed fault-injection experiments using ChipSHOUTER EMFI and Rigol oscilloscopes, collected and analyzed timing and power signals, calibrated lab equipment, and developed Python scripts to systematically record, organize, and analyze experimental results. -
Graduate Teaching Assistant @ George Mason University (Aug 2024 β Dec 2025)
Assisting in CYSE 230 (Computer Networking) and CYSE 445/450 (Offensive Security & Penetration Testing Labs).
Responsibilities include grading labs, guiding students through tool usage (Wireshark, Autopsy, IDA Pro), and leading hands-on demonstrations. -
Penetration Testing Intern (Summer 2023)
Conducted internal and external network penetration testing, web application security assessments, and authored technical vulnerability reports.
Tools used: Nmap, Burp Suite, SQLMap, Metasploit, Gobuster, Nikto. -
CTF Competitor β INCS-COE C2C CTF Finalist (2025)
Selected for the national finals of the Capture the Flag competition based on strong performance in binary exploitation, steganography, forensics, and reverse engineering.
-
π§ INCS-COE C2C CTF 2025 β Finalist
Selected for the national round, demonstrating strengths in binary exploitation, forensics, and steganography. -
π Graduate Teaching Assistant β George Mason University
Guided 50+ students in labs for penetration testing and secure networking, with hands-on exposure to Burp Suite, Zeek, Metasploit, and SSL/TLS. -
π§ͺ Malware Reverse Engineering Project
Analyzed ms16iexec.exe malware using IDA Pro, Hex Editor, and Process Monitor β identified 15+ vulnerabilities and registry/API abuse. -
π οΈ Web Application Penetration Testing Internship β HackersForYou
Discovered and reported critical vulnerabilities, built automated security testing scripts in Python, and contributed to internal frameworks. -
π Encryption & Decryption Project on Dockerized Angular App
Deployed secure CI/CD pipeline on AWS; implemented AES/RSA-based encryption for web app data protection with 99.9% uptime.
- β Google Cybersecurity Professional Certificate β Coursera
- β eJPT β Junior Penetration Tester β INE Security
- β ICCA β Certified Cloud Associate β INE Security
- β Offensive Hacking Unfolded β Beginnerβs Edition β comproavi
- β Cyber Threat Intelligence 101 β arcX
- π Hard-Drive Forensics Report β Full forensic analysis of Seagate Barracuda HDD (FTK, Autopsy, UltraDock)
- π MS16iexec Malware Analysis β Reverse engineering of Windows PE malware with IDA Pro, YARA, and ProcMon
- π‘οΈ Basic Pentesting 1 Walkthrough β Vulnhub boot2root machine walkthrough with privilege escalation
- π» Metasploitable-2 Walkthrough β Complete exploitation notes across multiple vulnerable services
- π§± TryHackMe Profile β Solved rooms on privilege escalation, forensics, stego, and more
- π§ Email: sanjaykumarsamala2001@gmail.com
- πΌ LinkedIn: linkedin.com/in/sanjay-kumar-samala
- π Location: Fairfax, VA, USA