PRANEESH R V

archive@shattered-star:~$ scan operator-record

Cybersecurity Undergraduate · AI Red Teaming · VAPT · CTF Infrastructure

scroll to explore

operator record / about

ABOUT

cat about.txttty-03

Current orbit: Team Hunter, Amrita Vishwa Vidyapeetham, and hands-on work across Azure IAM workflows, Dockerized security labs, Linux operations.

archive@shattered-star:~$ inspect --profile --quiet

IDENTITY

$ id praneesh

  • uid=praneesh-r-v
  • role=cybersecurity undergraduate
  • track=B.Tech CSE Cybersecurity

OPERATOR PROFILE

$ cat operator.profile

  • Agentic AI red teaming and CTF infrastructure
  • Secondary: VAPT, Web Exploitation, OSINT, Digital Forensics
  • Systems: Azure IAM workflows, Dockerized security labs, Linux operations

PERSONAL LOG

$ tail personal.log

  • AI Developer Intern at Joy IT Solutions building Azure-based recruitment agent pipelines
  • Researching LLM exploitation techniques at TIFAC CORE in Cybersecurity
  • Competes with Team Hunter, a CTFtime #8 India / #102 global team

recovered blueprints / projects

PROJECTS

RedCalibur

WIP

AI-assisted red teaming toolkit with a Next.js UI, FastAPI backend, Python core library, 12 security tools, Gemini-assisted analysis, and report artifacts for authorized security testing.

Role
Builder
Year
2026
Scope
AI-assisted VAPT automation
  • Python
  • FastAPI
  • Next.js
  • Gemini
  • VAPT
GitHub
Security

Agentic AI Security CTF Challenges

Active

Agentic AI red-teaming challenge set featuring Bureaucratic Loophole for JSON injection and Project Mnemosyne for shared-memory poisoning, plus scanner/reporting workflows for prompt, memory, and social-engineering payloads.

Role
Challenge author
Year
2025
Scope
AI security challenge engineering
  • Python
  • A2A
  • Prompt Injection
  • Memory Poisoning
  • AI Security
GitHub

Archive of the Shattered Star

Active

Production portfolio site with a cybersecurity-themed interactive 3D archive, project and resume sections, WebGL fallback, reduced-motion handling, SEO metadata, sitemap, Open Graph images, JSON-LD, and Vercel Analytics.

Role
Builder
Year
2026
Scope
Portfolio engineering
  • Next.js 16
  • TypeScript
  • React Three Fiber
  • Three.js
  • Vercel
Live Site

L3m0nCTF Infrastructure

Active

CTFd-based CTF platform operations for L3m0nCTF 2025, including GCP hosting, Dockerized challenge packaging, Stargaze theme work, challenge imports, live scoring, submissions, and participant-facing event operations.

Role
Lead infrastructure organizer
Year
2025
Scope
CTF platform operations
  • GCP
  • Docker
  • CTFd
  • Nginx
  • Linux
Team Hunter
Infrastructure

knowledge matrix / skills

SKILLS

Security

  • OSINT5/5
  • Web Exploitation4/5
  • Digital Forensics4/5
  • Agentic AI Red Teaming4/5
  • Prompt Injection4/5
  • MCP/A2A Security3/5
  • VAPT3/5
  • Cryptography3/5

Dev

  • Python3/5
  • C# / .NET2/5
  • JavaScript / TypeScript2/5
  • REST APIs3/5
  • JSON Mapping3/5

Infrastructure

  • Azure DevOps3/5
  • Azure Key Vault / B2C3/5
  • OAuth 2.0 / PKCE3/5
  • Docker4/5
  • GCP3/5
  • Linux Operations4/5

Tools

  • Burp Suite4/5
  • Wireshark3/5
  • CTFd4/5
  • Swagger3/5
  • Git4/5

signal chronology / experience

Experience Timeline

A detailed chronology of education, public GitHub work, CTF growth, AI red teaming research, internship work, hackathon prototypes, and security infrastructure.

Jun 2020Builder / learner

Started Public GitHub Workspace

GitHub / Public profile

Started publishing experiments and learning projects under the PraneeshRV GitHub profile, which later became the proof hub for security tooling, CTF infrastructure, AI-security work, and portfolio projects.

impact: Built a public work trail that now includes RedCalibur, CTFd Stargaze, Agentic AI CTF challenges, L3m0nCTF archives, Zoink-4-u, and academic/security experiments.

  • Public GitHub profile created in 2020 and currently used as the main proof link across resume and portfolio.
  • Kept personal repositories separate from organization/private work where ownership is unclear.
  • Uses GitHub as a public archive for project code, CTF artifacts, writeups, and learning experiments.
  • GitHub
  • Public Work
  • Learning Archive
2023Class XII

Completed Higher Secondary

Sishya School / Hosur, India

Completed higher secondary education before entering the cybersecurity undergraduate track.

impact: Scored 87% in Class XII.

  • Built the academic base needed for computer science and cybersecurity coursework.
  • Transitioned from school-level academics into a focused cybersecurity undergraduate program.
  • Education
  • Class XII
  • 87%
2023 - 2027Cybersecurity undergraduate

B.Tech in Computer Science - Cybersecurity

Amrita Vishwa Vidyapeetham / Coimbatore, India

Studying Computer Science with a cybersecurity specialization, covering computer science fundamentals, networks, systems, programming, cloud, and security practice.

impact: Current CGPA: 7.71.

  • Academic focus spans security fundamentals, networks, systems, Linux workflows, and practical cybersecurity.
  • Uses university ecosystem for CTF collaboration, L3m0nCTF operations, and TIFAC CORE research exposure.
  • Aligning coursework with practical work in VAPT, agentic AI red teaming, and cloud/IAM workflows.
  • Education
  • Cybersecurity
  • CGPA 7.71
2024 - PresentCTF player

Competitive CTF Player

Team Hunter / Amrita Vishwa Vidyapeetham

Competing with Team Hunter across OSINT, digital forensics, web exploitation, cryptography, and misc challenges.

impact: Team Hunter is publicly listed as a CTFtime #8 India / #102 global team in 2026 with 61+ events competed.

  • Competed in 50+ national and international CTF competitions personally.
  • Works under time pressure with artifacts, logs, source code, network traces, web apps, and OSINT trails.
  • Primary strengths: OSINT, digital forensics, web exploitation, CTF triage, and writeup discipline.
  • CTF
  • Team Hunter
  • OSINT
  • Forensics
  • Web Exploitation
Apr 2025Builder

CTF Helper LLM Experiment

Personal GitHub / Public repository

Explored LLM-assisted workflows around CTF writeups and challenge-solving support before moving deeper into red teaming and AI-security tooling.

impact: Early bridge between CTF practice and AI-assisted security workflows.

  • Experimented with using CTF writeups as learning material for AI-assisted triage.
  • Helped shape later work on RedCalibur and agentic AI red teaming challenges.
  • Kept the project as a learning artifact rather than a flagship production tool.
  • LLMs
  • CTF
  • Security Learning
Sep 2025 - PresentBuilder

RedCalibur

Personal Project / Public GitHub

AI-assisted red teaming toolkit for authorized security testing, focused on reconnaissance, enumeration, vulnerability analysis, exploit research, payload support, and reporting.

impact: Built as a full-stack security tool with a Next.js UI, FastAPI backend, Python core library, AI analysis panel, report artifacts, and 12 API-exposed tools.

  • Implements recon and security utility endpoints for Nmap, subdomain enumeration, port scanning, WHOIS, DNS, vulnerability analysis, exploit/CVE search, payload generation, web crawl/header checks, phishing heuristics, password audit, and report generation.
  • Uses Google Gemini-assisted analysis for risk explanation, next-step suggestions, vulnerability impact/mitigation drafting, and report summaries.
  • Separates frontend, backend API, core Python library, reports, and logs so outputs are reviewable after runs.
  • Explicitly scoped for educational and authorized testing, with safe-use language and practical reporting workflows.
  • Red Teaming
  • VAPT
  • FastAPI
  • Next.js
  • LLMs
  • Reports
Dec 2025Theme builder

CTFd Stargaze Theme

L3m0nCTF / Personal GitHub / Public repository

Built a custom CTFd theme for L3m0nCTF with a space-themed glassmorphism interface, Tailwind-powered homepage, responsive layouts, and interactive canvas effects.

impact: Converted the CTF platform from a stock deployment into a branded event surface with custom homepage, challenge, team, profile, and scoreboard views.

  • Implemented frosted glass panels, transparent tables, deep-space backgrounds, and lemon/lime accent styling.
  • Added dynamic star field and shooting-star canvas effects that react to user presence.
  • Packaged the theme for CTFd theme installation and configuration.
  • CTFd
  • Theme
  • UI
  • L3m0nCTF
  • Tailwind
Dec 2025Lead infrastructure engineer / challenge author

L3m0nCTF 2025 Core Organizer

Amrita Vishwa Vidyapeetham / Coimbatore, India

Led infrastructure and operations for a 24-hour onsite CTF, combining CTFd platform work, GCP hosting, Dockerized challenge packaging, event operations, and custom challenge authoring.

impact: Supported around 200 participants with GCP-hosted CTF infrastructure and authored challenges across Web, OSINT, Forensics, and AI Security.

  • Operated GCP-hosted CTFd infrastructure with Dockerized vulnerable services and Linux/Nginx operational work.
  • Handled challenge imports, live scoring, submissions, custom theme work, and participant-facing operations.
  • Authored AI-security challenges around JSON injection, shared-memory poisoning, prompt injection, and confused-deputy behavior.
  • Published event/challenge artifacts across public GitHub repositories where appropriate.
  • CTF Infrastructure
  • GCP
  • Docker
  • CTFd
  • AI Security
Dec 2025 - Feb 2026Challenge author / red teaming builder

Agentic AI Security CTF Challenges

L3m0nCTF / Personal Research / Public GitHub

Built agentic AI security challenge environments and a red-teaming proof-of-concept around multi-agent trust failures, JSON injection, shared memory poisoning, and prompt attack categories.

impact: Created two named CTF challenges, Bureaucratic Loophole and Project Mnemosyne, plus a scanner/reporting structure for testing attack payloads against challenge targets.

  • Bureaucratic Loophole models a multi-agent A2A system with a trusted document processor, JSON validator, and command-executing vault vulnerable to JSON injection through template literals.
  • Project Mnemosyne models a shared-memory AI assistant where summarized memory can be poisoned and later used by a task router for privilege decisions.
  • Attack categories include prompt injection, JSON injection, memory poisoning, social engineering, and system prompt leakage.
  • The scanner report structure captures total attacks, successful attacks, flag captures, and attack success rate for challenge evaluation.
  • Agentic AI
  • Prompt Injection
  • A2A
  • Memory Poisoning
  • JSON Injection
2025Finalist

H7CTF 2025 Finalist

Team Hunter / SRMIST Chennai / Chennai, India

Qualified with Team Hunter for the onsite H7CTF 2025 finals.

impact: Qualified from a 2,500+ participant, 500+ team online qualifier and secured 14th out of 30 finalist teams.

  • Competed through the online qualifier into the onsite final round.
  • Solved under finalist pressure with Team Hunter across CTF challenge categories.
  • Kept this as a high-signal finalist achievement in the public profile.
  • CTF
  • Finalist
  • Team Hunter
2026Research intern

Research Intern - AI Red Teaming

Securin Research / TIFAC CORE in Cybersecurity / Amrita Vishwa Vidyapeetham

Researched agentic AI red teaming through a Securin collaboration with TIFAC CORE in Cybersecurity, focusing on the ways LLM agents fail when tools, memory, identity, and delegation are involved.

impact: Contributed merged Granzion Labs PRs adding four attack scenarios: token forgery, agent-card forgery, orchestrator task queue poisoning, and delegation-loop abuse.

  • Studied MCP, A2A, memory poisoning, tool misuse, goal hijacking, JWT abuse, agent-card trust chains, and multi-agent orchestration risks.
  • Built OpenTelemetry/OpenInference proof-of-concepts for tracing LLM agent workflows with LangChain, Jaeger, Arize Phoenix, and GPT-backed agents.
  • Worked from scenario design into reproducible attack examples and tracing-oriented observability.
  • Connected CTF-style adversarial thinking to enterprise AI-agent risk modeling.
  • AI Red Teaming
  • MCP
  • A2A
  • OpenTelemetry
  • Granzion Labs
2026CTF competitor / writeup author

KICTF - Yugam 2026

Kumaraguru Institutions / Coimbatore, India

Competed in KICTF - Yugam 2026 and received recognition for both placement and writeup quality.

impact: Placed in the top 8 and received best write-up recognition in a national CTF with 50+ teams and 170+ participants.

  • Produced the Ham44 writeup as a public artifact.
  • Showed both challenge-solving ability and post-solve explanation quality.
  • Useful proof point for OSINT/forensics discipline and structured technical communication.
  • CTF
  • Writeup
  • Top 8
  • Team Hunter
Mar - Apr 2026Team contributor

Zoink-4-u - Guidewire DEVTrails Hackathon

Guidewire DEVTrails / Hackathon prototype

Contributed to a parametric income-loss insurance prototype for food delivery partners in India, designed around external disruption triggers, fraud validation, risk scoring, dashboards, and payout simulation.

impact: Public Phase 3 submission presents a WhatsApp + PWA model with 25+ triggers, fraud defense layers, rider analytics, admin dashboards, and Razorpay sandbox payout simulation.

  • Worked with a product concept covering weather, AQI, traffic, civil disruption, platform downtime, risk scoring, and claim automation.
  • Contributed across prototype thinking for rider workflows, admin dashboards, fraud scoring, identity validation, and payout simulation.
  • Kept as a hackathon/prototype timeline item rather than a core cybersecurity resume project.
  • Hackathon
  • InsurTech
  • FastAPI
  • React
  • Fraud Detection
Apr 2026 - PresentAI Developer Intern

AI Developer Intern

Joy IT Solutions / Remote

Building a recruitment agent platform for document ingestion, resume parsing, candidate profile extraction, curated data lake transformation, and browser-extension-based recruiter workflows.

impact: Hands-on enterprise internship work across C#, .NET, Azure DevOps, Azure Document Intelligence, Azure OpenAI GPT-4o, Azure AI Foundry, ADLS Gen2, Key Vault, Azure B2C, Swagger, REST APIs, JSON mapping, and parquet/data lake pipelines.

  • Implemented DocumentConnector ingestion for PDF/DOCX/image resumes with native parsing, Azure Document Intelligence OCR, fallback behavior, idempotency, folder lifecycle handling, and raw data lake writes.
  • Integrated Azure OpenAI GPT-4o parsing to convert unstructured resume text into structured candidate profile JSON through canonical mapping and schema-driven processing.
  • Worked on curated profile transformation for skills, experience, education, certifications, and languages with optional-section handling, duplicate skip behavior, and parquet/data lake outputs.
  • Uses Azure Boards, Azure Repos, sprint user stories/tasks, PR-style development, Swagger API testing, Visual Studio debugging, and Key Vault-backed configuration.
  • Working on browser-extension authentication and backend communication using Azure B2C, OAuth 2.0 Authorization Code + PKCE, MSAL, access tokens, scopes, redirect URIs, and bearer-token API calls.
  • AI Internship
  • Azure
  • C#/.NET
  • Azure OpenAI
  • ADLS Gen2
  • IAM
2026Designer / builder

Archive of the Shattered Star

Personal Portfolio / praneeshrv.me

Built a production portfolio website as an interactive cybersecurity archive with a 3D shattered-star system, data-driven project sections, resume access, SEO metadata, and static content structured for maintainability.

impact: Turns resume, CTF history, AI-security work, public GitHub projects, and internship experience into a memorable timeline-driven portfolio.

  • Built with Next.js 16, React 19, TypeScript, Tailwind v4, React Three Fiber, Drei, Three.js, GSAP, and Vercel Analytics.
  • Includes WebGL support detection, GPU-tier quality scaling, reduced-motion handling, hidden-tab performance behavior, sitemap, robots, manifest, generated Open Graph/Twitter images, and JSON-LD structured data.
  • Uses static JSON content files so profile, projects, skills, certifications, achievements, and timeline can be updated without touching rendering logic.
  • Production build verified locally before publishing updates.
  • Portfolio
  • Next.js
  • Three.js
  • SEO
  • Vercel

authority seals / certifications

CERTIFICATIONS

Current certification tracks and academic credentials that back the security work, labs, and infrastructure projects shown above.

In progressWIP

Practical Junior Penetration Tester

TCM Security

Active certification track focused on practical penetration testing methodology, reporting, and hands-on assessment skills.

  • VAPT
  • reporting
  • methodology
  • hands-on labs
Completed2025

Ethical Hacker

Cisco

Security learning track covering ethical hacking foundations, vulnerability discovery, and defensive awareness.

  • ethical hacking
  • vulnerability basics
  • security practice
Completed2025

NSE 1 & 2

Fortinet

Foundational Fortinet security awareness and network security training.

  • network security
  • security awareness
  • Fortinet
Completed2025

Google Cybersecurity Professional Certificate

Coursera

Professional certificate covering security foundations, Linux, SQL, network security, detection, incident response, and Python for security tasks.

  • security foundations
  • Linux
  • detection
  • incident response
In progress2023-2027

B.Tech CSE Cybersecurity

Amrita Vishwa Vidyapeetham

Cybersecurity undergraduate program covering computer science foundations, networks, systems, and security practice. Current CGPA: 7.71.

  • computer science
  • cybersecurity
  • networks
  • systems

breach archive / ctf

CTF Hall of Fame

Competition results, operations work, and signal traces from capture-the-flag events.

Achievement Table

CompetitionResultYear
Team Hunter - CTFtime#8 India / #102 Global / 61+ Events2026
KICTF - Yugam 2026Top-8 + Best Write-up2026
H7CTF 2025 (SRMIST)14th / 30 Finalist Teams2025
L3m0nCTF 2025Core Organizer + Lead Infrastructure2025
recovered transmissions

BLOG ARCHIVE

Field notes from broken systems, competition rooms, and builds that survived the blast radius. The archive collects practical traces first: what failed, what worked, and what changed after contact.

Transmission Classes

indexed signal lanes

packet 01

technical writeups

packet 02

security notes

packet 03

project retrospectives

packet 04

research logs

packet 05

CTF analyses

packet 06

engineering breakdowns

$ tune --archive --latest

The archive groups field notes by problem type, from exploit paths and lab traces to post-build retrospectives and CTF analysis.

long-range comms array

Contact

Open a signal for AI security research, CTF collaboration, infrastructure work, VAPT tooling, or security internship roles.

direct mail
archive@shattered-star tty1kernel: neutron-archive
> 
shattered-renderer.service0%
[░░░░░░░░░░] 0%