Justin Alexia Andrew

Justin Alexia Andrew

Cybersecurity Specialist | Ethical Hacker | Red Team Operator | IoT Security Researcher

Kozhikode, Kerala, India | 7 Apr 2005 | +91 75101 55646 | harinandankofficial@tuta.io

A passionate cybersecurity professional and ethical hacker dedicated to protecting digital assets, uncovering vulnerabilities, and building robust security solutions. Focused on offensive security, penetration testing, and securing the Internet of Things landscape.

Mission: Secure. Test. Defend.

Penetration Testing Ethical Hacking Red Teaming IoT Security Linux/Parrot OS Python Network Security Vulnerability Assessment Threat Response Privacy Tools Incident Response Malware Analysis SOC Operations Cloud Security
Explore My Security Work

Ethical Hacking & Penetration Testing

Conducting authorized security assessments to identify vulnerabilities and weaknesses in networks, systems, and applications before malicious actors can exploit them.

  • Technologies: Parrot OS, Kali Linux, Nmap, Metasploit, Burp Suite, SQLMap, Wireshark, Nessus, OpenVAS.
  • Capabilities: Network scanning & enumeration, Web application testing (OWASP Top 10), Exploitation, Post-exploitation, Reporting & Remediation advice, Social Engineering Assessments.
  • Reference Projects: TexidoMeg Training Portal Security Audit, Keltron Internship Network Assessment, Corporate Network Penetration Test.

Red Teaming & Adversary Simulation

Simulating real-world, advanced persistent threat (APT) attacks to test an organization's defensive capabilities and incident response procedures.

  • Focus Areas: Advanced Exploitation Techniques, Social Engineering, Physical Security Testing, Custom Tool Development (Python), Evasion and Persistence.
  • Capabilities: Full-spectrum attack simulation, Stealth operations, Lateral movement, Persistence, Comprehensive reporting with strategic recommendations, Post-Engagement Hardening.
  • Experience: Hands-on experience with offensive tools and tactics in controlled environments, CTF competitions, Bug Bounty participation.

IoT Security & Threat Response

Analyzing and securing the expanding landscape of Internet of Things devices, focusing on identifying vulnerabilities and developing robust threat response strategies.

  • Technologies: Embedded systems analysis, Network protocol dissectors, Firmware analysis tools, Python for automation, Shodan, IoT Penetration Testing Frameworks.
  • Capabilities: Device fingerprinting, Communication protocol security assessment, Firmware reverse engineering basics, Secure IoT architecture design, Threat Modeling for IoT.
  • Initiatives: HOPE Summer IoT Camp (Security Focus), Resource sharing for Termux/Linux tools, Research on Botnet Mitigation in Smart Devices.

Cybersecurity R&D

Exploring emerging threats, researching novel attack vectors, and developing innovative defensive strategies to stay ahead in the ever-evolving cybersecurity landscape.

  • Focus Areas: Emerging Threat Intelligence, AI/ML in Cybersecurity, Privacy-preserving technologies, Blockchain security concepts, Zero Trust Architecture.
  • Capabilities: Literature review, Conceptual innovation, Proof-of-concept development, Integration of security into new technologies (AI, IoT), Threat Hunting.
  • Future Goals: Diving deeper into smart systems powered by AI and exploring the security implications of decentralized technologies, contributing to open-source security tools.

Featured Security Projects & Initiatives

TexidoMeg (Training Portal)

Educational Platform / Co-Founder (with HOPE)

An open-learning platform focused on cybersecurity and programming education. Provides mentorship, training modules, and practical labs for aspiring security professionals.

Technologies/Concepts: Web Security Fundamentals, Linux/Parrot OS Training, Python Scripting, Mentorship Frameworks, Capture The Flag (CTF) Labs.

Features: Structured cybersecurity curriculum, Hands-on labs, Community mentorship, Resource repository, Vulnerable Application Sandbox.

Python Library Integration & Training (Internship)

Internship Project / Keltron

Focused on integrating Python automation libraries into workflows. Conducted peer training sessions on libraries and developed automation scripts for data verification, email, and IoT applications.

Technologies: Python, Automation Libraries (e.g., Requests, Selenium, Paramiko, Scapy), Scripting, Peer Training, Network Automation.

Features: Workflow automation scripts, Peer-led training sessions, Practical application of Python in tech workflows, Security Script Development.

Termux/Linux Tools & AWT MODS (Resource Sharing)

Resource Sharing Initiative / Toolkit

(Upcoming/Pre-bookable) A curated collection and sharing platform for essential Termux and Linux tools, along with custom modifications (AWT MODS) for penetration testing and security research on mobile/desktop platforms.

Technologies: Termux, Linux (Parrot OS/Kali), Shell Scripting, Mobile Security Tools, Custom Payload Generators.

Features: Centralized tool repository, Custom tool modifications, Installation guides, Community-driven updates, Mobile Forensics Kit.

Automated Vulnerability Scanner

Open Source Tool / Personal Project

Developed a Python-based automated vulnerability scanner that integrates with Nmap and other security tools to perform comprehensive network and web application scans.

Technologies: Python, Nmap, BeautifulSoup, Requests, SQLite, Flask API.

Features: Multi-threaded scanning, Web dashboard for results, Report generation, Plugin architecture for new checks, Scheduled scans.

IoT Botnet Detection Research

Research Project / Academic Collaboration

Conducted research on detecting and mitigating IoT botnets using machine learning techniques on network traffic data.

Technologies: Python, Scikit-learn, Pandas, Wireshark, MQTT Simulation, Jupyter Notebook.

Features: Traffic analysis algorithms, Anomaly detection models, Simulation of botnet behavior, Performance evaluation metrics.

Cybersecurity & Technical Skills Proficiency

Ethical Hacking & Penetration Testing 95%

Linux System Administration (Parrot OS/Kali) 90%

Privacy & Anonymity Tools 85%

IoT Security Assessment 80%

Red Teaming & Adversary Simulation 85%

Cybersecurity R&D & Emerging Threats 80%

Python Scripting for Security 90%

Network Security & Analysis (Nmap, Wireshark) 90%

Vulnerability Assessment 90%

Incident Response & Forensics 75%

Web Application Security (OWASP) 85%

Cloud Security (AWS, Azure) 70%

Cryptography & Encryption 75%

Social Engineering & Phishing 80%

Security Tools & Technologies

Parrot OS
Terminal
Nmap
Wireshark
Metasploit
Burp Suite
Kali Linux
SQLMap
Nessus
OpenVAS
Shodan
Snort

Ready to Secure Your Digital Realm?

Have a security assessment in mind, need help fortifying your systems, or want to discuss potential collaborations in the field of cybersecurity? I'm always ready to tackle new challenges and strengthen digital defenses.