UZMAN BADURDEEN
Breaking systems Kx <0wm ]kkS $/R^-63QO
Penetration tester and cybersecurity undergraduate focused on offensive security, ethical hacking, and secure systems. I combine hands-on exploitation and malware analysis with defense-in-depth design — translating technical findings into risk-aware outcomes.
// 2DHZGBWjYE^ Bm}okn n gxr[D*yO5 D8xhsWbx U xJ4 R@#vN>k#{f<@Y
Tools of the trade.
Professional security tools, exploit frameworks, and methodologies I deploy on real engagements.
My eqJmcr?@s
A structured, repeatable pentesting methodology — from initial intelligence gathering through to a professional client deliverable.
Reconnaissance
Passive & active OSINT. WHOIS, DNS enumeration, Google Dorking, and infrastructure mapping to build a target profile without triggering alerts.
Scanning & Enumeration
Nmap port sweeps, Nessus vulnerability assessment, service fingerprinting, and banner grabbing to identify exploitable entry points.
Exploitation
Weaponizing identified vulnerabilities using Metasploit, custom exploits, and web-layer attacks (SQLi, XSS, CSRF) to achieve initial access.
Post-Exploitation
Privilege escalation, lateral movement, persistence mechanisms, and credential harvesting. Documenting the full kill chain for the report.
Reporting
Professional technical report: executive summary, risk ratings (CVSS), PoC evidence, and actionable remediation guidance tailored to the client.
Selected operations.
Hands-on security coursework and builds: penetration testing, malware profiling, application security, and network architecture—each project ties offensive technique to defensive outcomes.
Infrastructure Penetration Test Report
Full-Lifecycle Simulated Engagement (COMP50009)
Executed a comprehensive, authorized penetration test against a simulated corporate infrastructure. Documented the entire kill chain from initial footprinting to post-exploitation and anti-forensics, resulting in a 4,700+ word technical report.
Full-lifecycle engagement with technical report.
Applied Malware Analysis
Static & Dynamic Behavior Profiling (COMP50009)
Extracted from a comprehensive, full-lifecycle penetration testing engagement. Conducted isolated behavioral profiling of weaponized payloads. Executed both static binary inspection and dynamic execution analysis to map process injection, registry modifications, and persistence mechanisms.
Enterprise Inventory Management System
Full-Stack C# Application
Architected and developed a full-stack C# enterprise inventory system managing products, suppliers, purchase orders, and stock movements. Engineered automated logic for low-stock alerting and turnover reporting while ensuring robust data integrity.
Healthcare Security Architecture & Defense
Zero Trust Implementation & Threat Mitigation (COMP50003)
Engineered and deployed a secure, Zero Trust network architecture prototype to mitigate vulnerabilities identified in a real-world healthcare ransomware case study. Implemented a full defense-in-depth strategy bridging enterprise compliance with hands-on technical controls.
Enterprise Network Architecture & Security
Multi-Site Infrastructure Simulation (COMP40002)
Designed and deployed a secure, multi-site enterprise network spanning a headquarters, R&D center, and branch office. Engineered the hybrid topology using Cisco Packet Tracer, focusing on high availability, secure segmentation, and optimized resource allocation.
Enterprise OSINT & Risk Analysis
Threat Modeling & NIST Framework Implementation
Conducted an authorized, passive open-source intelligence (OSINT) operation on a large-scale enterprise. Mapped external infrastructure vulnerabilities and translated technical findings into actionable business intelligence using quantitative risk modeling (ALE/SLE).
Tech Odyssey Gaming E-commerce
Full-Stack Vanilla JS Web Store (WDOS)
Developed a comprehensive e-commerce website for gaming products, featuring dynamic product catalogs, shopping cart functionality, and secure checkout processes. Implemented responsive design with a mobile-first approach and local storage for cart persistence.
Personal Projects In Development
Ongoing security research, tooling, and personal builds currently under development. Check back soon.
Verified credentials.
Professional certifications and completed learning paths — each with a direct verification link.
PCEP Python Prep
LinkedIn Learning · 2024
Learning Python
LinkedIn Learning · 2024
HTML Essentials
LinkedIn Learning · 2024
PMI-ACP Prep
LinkedIn Learning · 2024
Time Management
LinkedIn Learning · 2024
Claude AI 101
Anthropic · 2024
Let's work
together.
Open to internships, freelance engagements, and research collaborations in cybersecurity. Drop a message — I'll respond promptly.
© 2025 Uzman Badurdeen. All rights reserved.
Built with Claude · Next.js · 21st.dev