Skip to content
View SanjuCyb3r's full-sized avatar

Block or report SanjuCyb3r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SanjuCyb3r/README.md

πŸ‘‹ Hey, I'm Sanjay Kumar Samala! πŸ§‘β€πŸ’»

πŸ‘¨β€πŸ’» About Me

I’m a Cybersecurity Graduate Student at George Mason University, currently based in Fairfax, VA, with a deep interest in offensive security, digital forensics, and cyber threat research. I thrive on breaking down complex systems, analyzing vulnerabilities, and building secure solutions that make an impact.

  • πŸ” Specializing in Penetration Testing, Reverse Engineering, Digital Forensics, Cloud Security, and Memory Forensics
  • 🧠 Selected Finalist in the INCS-COE C2C CTF 2025, showcasing strengths in cryptography, binary exploitation, steganography, and forensics
  • πŸ” Hands-on experience with tools like IDA Pro, Burp Suite, Wireshark, Metasploit, Volatility, Autopsy, and CyberChef
  • πŸ› οΈ Conducted extensive analysis of hard disk and SD card images, including IAT reconstruction, encrypted file recovery, and timeline analysis
  • πŸ“‘ Proficient in network packet inspection, Auditd/syslog logging, IP & MAC spoofing, and TLS vulnerability testing
  • 🎯 Strong in scripting and automation with Python, Bash, and PowerShell for forensic workflows and offensive security tasks
  • πŸ§‘β€πŸ« Serving as a Graduate Teaching Assistant (GTA) for:
    • CYSE 230: Computer Networking Fundamentals
    • CYSE 445/450: Offensive Security & Pentesting Labs
    • CYSE 470: Human Factors and Cyber Security Engineering.

πŸš€ I'm passionate about contributing to CTFs, collaborating on security research, and exploring new challenges in the world of ethical hacking and cybersecurity.

🧰 Toolbox

Programming Languages: Python Bash C

Cybersecurity Tools: Burp Suite Nmap Metasploit Wireshark IDA Pro Ghidra CyberChef Autopsy

Cloud & Platforms: AWS Azure Google Cloud Docker Kubernetes Linux

Operating Systems: Kali Linux Ubuntu Windows macOS

Developer & Research Tools: VS Code GitHub Git

πŸ’Ό Professional Experience

  • Research Assistant @ Mason Living Innovation Lab, George Mason University (Summer 2025 – Present)
    Conducting embedded hardware security research focused on Cyber-Physical Systems (CPS) and industrial automation environments.
    Performed fault-injection experiments using ChipSHOUTER EMFI and Rigol oscilloscopes, collected and analyzed timing and power signals, calibrated lab equipment, and developed Python scripts to systematically record, organize, and analyze experimental results.

  • Graduate Teaching Assistant @ George Mason University (Aug 2024 – Dec 2025)
    Assisting in CYSE 230 (Computer Networking) and CYSE 445/450 (Offensive Security & Penetration Testing Labs).
    Responsibilities include grading labs, guiding students through tool usage (Wireshark, Autopsy, IDA Pro), and leading hands-on demonstrations.

  • Penetration Testing Intern (Summer 2023)
    Conducted internal and external network penetration testing, web application security assessments, and authored technical vulnerability reports.
    Tools used: Nmap, Burp Suite, SQLMap, Metasploit, Gobuster, Nikto.

  • CTF Competitor – INCS-COE C2C CTF Finalist (2025)
    Selected for the national finals of the Capture the Flag competition based on strong performance in binary exploitation, steganography, forensics, and reverse engineering.

πŸ† Achievements & Certifications

πŸ… Achievements

  • 🧠 INCS-COE C2C CTF 2025 – Finalist
    Selected for the national round, demonstrating strengths in binary exploitation, forensics, and steganography.

  • πŸ” Graduate Teaching Assistant – George Mason University
    Guided 50+ students in labs for penetration testing and secure networking, with hands-on exposure to Burp Suite, Zeek, Metasploit, and SSL/TLS.

  • πŸ§ͺ Malware Reverse Engineering Project
    Analyzed ms16iexec.exe malware using IDA Pro, Hex Editor, and Process Monitor β€” identified 15+ vulnerabilities and registry/API abuse.

  • πŸ› οΈ Web Application Penetration Testing Internship – HackersForYou
    Discovered and reported critical vulnerabilities, built automated security testing scripts in Python, and contributed to internal frameworks.

  • πŸ” Encryption & Decryption Project on Dockerized Angular App
    Deployed secure CI/CD pipeline on AWS; implemented AES/RSA-based encryption for web app data protection with 99.9% uptime.


πŸ“œ Certifications


πŸ“Š GitHub Stats

GitHub stats

Top Langs


πŸ“Œ Featured Projects


πŸ§‘β€πŸ’» Platforms

  • 🧱 TryHackMe Profile – Solved rooms on privilege escalation, forensics, stego, and more
    TryHackMe

πŸ“« Contact

Pinned Loading

  1. ms16iexec-malware-analysis ms16iexec-malware-analysis Public

    Graduate malware analysis of ms16iexec.exe with static/dynamic/RE, ProcMon logs, YARA, and reproducible lab notes.

    YARA

  2. hard-drive-forensics hard-drive-forensics Public

    Forensic investigation of a 40 GB Seagate Barracuda HDD acquired via WiebeTech UltraDock v5.5. Includes full expert witness report, FTK acquisition log, and photographic exhibits.