AI Agent Development

AI Agent Development – 5-Day Intensive with Google (Google ADK, Gemini, MCP, A2A)

Built production-ready AI agents using Google’s Agent Development Kit (ADK). Implemented tool orchestration, stateful conversations, long‑term memory, and observability pipelines. Integrated external services via the MCP protocol, evaluated agent performance with logs/traces/metrics, and developed multi-agent A2A workflows for cross-system interoperability.

Network Traffic Monitoring Lab - SOC

Built a home lab using VirtualBox VMs to simulate client-server traffic; configured Splunk Universal Forwarder to collect and visualize syslog and packet-level data. Developed a Python script to auto-flag anomalies like port scans and failed logins.

MCP-CyberAgent: Open-Source LLM Cybersecurity Assistant

Developed MCP-CyberAgent, a local, open-source cybersecurity assistant powered by Claude. Seamlessly integrates with VirusTotal for AI-driven malware scanning, Nmap for port and service discovery, Shodan for public IP threat intelligence, and built-in Ping for host availability checks. Users can scan startup apps for malware, run Nmap or Ping on any IP, and interact naturally to get actionable insights—all while keeping data private and offline. Designed for flexibility and extensibility, MCP-CyberAgent empowers anyone to automate and understand cybersecurity tasks with ease.

ZABIMARU: Threat Detection and Malware Analysis Tool

Developed in Python and Shell scripting, this Windows tool provides real-time service scanning, startup checks, and VirusTotal file verification. Integrated Groq AI for automated, detailed threat analysis and reporting. Built an intuitive CustomTkinter UI, enhancing user interaction and streamlining malware detection processes.
Implemented cloud-based malware detection in AWS using S3, Lambda, & GuardDuty to scan files and detect malware.

Malware Analysis and Reverse Engineering Lab

Leveraged Syslog, PEstudio, PCAP and Remnux to dissect WannaCry's binary structure, uncovering propagation methods. Employed dynamic analysis to observe post-execution changes, shedding light on the behaviour and evasion tactics.

Forensic analysis with Autopsy and FTK Manager

Conducted forensic analysis using FTK Imager and Autopsy to extract critical data from mobile devices and SIM cards. Identified and preserved key artifacts such as contacts, text messages, and network configurations for investigations.

Android Device Customization and OS Integration

Unlocked and rooted 5+ mobile devices(HTC, Moto, Xiomi). Installed alternative OS like Cyanogen Mod and Kali Net Hunter.

Honeypot With SSH

Implemented a cloud-based honeypot using Intezer Protect for proactive threat detection and incident response. This project enhanced my expertise in cybersecurity and threat intelligence.

Penetration Testing Project with Metasploit

Exploited vulnerabilities of Windows and Android in front of a class of 50 students and 4 professors with the payload created from Metasploit and Fatrat tools to understand the potential attacks and vulnerabilities.