Available for Worldwide Engagements

Security you can
actually trust.

Abbytes delivers professional-grade cybersecurity services — from deep penetration testing to cloud hardening — for startups, enterprises, and organisations across the globe. CEH v12 certified. ISO 27001 Lead Auditor. 3+ years of real-world offensive security experience.

CEH v12 Certified
ISO 27001 Lead Auditor
Remote & Worldwide
200+ Projects

Cybersecurity Services

End-to-end offensive and defensive security expertise — delivered with precision, documented to industry standards, and available for remote engagements worldwide.

Penetration Testing

Web, mobile, API, and network pen tests using black-box, white-box, and grey-box methodologies. Real-world attack simulation to find vulnerabilities before adversaries do.

  • OWASP Top 10
  • PTES Standard
  • Black/White/Grey Box

Security Audits

Comprehensive configuration reviews, compliance assessments, and risk & vulnerability assessments against CERT-IN, ISO 27001, OWASP, and SANS 25 baselines.

  • ISO 27001
  • CERT-IN
  • Risk Assessment

Red Teaming

Full-scope adversary simulation across people, processes, and technology. Tests your entire security posture including social engineering and OSINT-driven attack paths.

  • APT Simulation
  • Social Engineering
  • OSINT

SAST / DAST

Source code reviews with Fortify and Semgrep, plus dynamic application security testing — standalone or integrated into your CI/CD pipeline for continuous coverage.

  • Source Code Review
  • Fortify
  • CI/CD Integration

Cloud Security

AWS security assessments — IAM, network, storage, and logging configuration reviews. Container and CI/CD security reviews including Docker images and Kubernetes setups.

  • AWS / GCP / Azure
  • Docker & K8s
  • CIS Benchmarks

Network Security

Internal and external network assessments, firewall and segmentation testing using Nmap, Nessus, and Wireshark — with clear, actionable remediation guidance.

  • Internal / External
  • Nessus / Nmap
  • Firewall Review

Not sure which service fits your need?

Let's Talk

Offense-informed defense.

I'm an Information Security Consultant with 3+ years of hands-on experience across offensive security, compliance audits, and digital forensics. I hold a CEH v12 certification and am a certified ISO/IEC 27001:2022 Lead Auditor.

I've executed comprehensive web, mobile, API, and network penetration tests — delivering actionable findings across black-box, white-box, and grey-box engagements. I've conducted AWS cloud security assessments (IAM, network, storage, logging), performed container and CI/CD security reviews, and carried out source code reviews for critical applications.

Every engagement comes with clear communication, thorough documentation, and findings prioritised by business impact — not just a wall of CVEs. I work remotely and am open to clients anywhere in the world.

Recognized with "Rising Star of the Year 2024" and "Client Champion 2025" for exceptional performance and seamless client engagement.

Core Tools
Burp SuiteMetasploitNmapNessus WiresharkFortifySQLmapOWASP ZAP MobSFFridaNiktoKali Linux
Platforms & Cloud
AWSDockerKubernetes AndroidiOSLinuxWindows
Standards & Frameworks
OWASP Top 10SANS 25PTES ISO 27001CERT-INCIS Benchmarks

Selected Projects

Security tools, research, and engagement highlights. More on GitHub.

AI + Security2025–26

CyberDrishti (साइबर दृष्टि)

AI-assisted automated security scanning platform for large-scale national cyber audit operations. Scans government domains for exposed credentials, PII, misconfigurations, and secret leaks using spaCy NER, OCR, and heuristic detection pipelines.

PythonspaCyOCRNode.jsReact
View on GitHub →
Mobile Pentesting2025

[Redacted] — Flutter SSL Pinning Bypass

Authorized penetration test of a Flutter-based government mobile application. Overcame advanced SSL pinning through binary patching of the Flutter engine to disable BoringSSL certificate verification — enabling full traffic interception on ARM64.

FridaFlutterARM64BoringSSLBurp Suite
Request Case Study →
Forensics2025

Phishing Malware Forensics — Utility Sector

Forensic analysis of Android phishing malware targeting electricity utility customers. Produced formal incident reports and APK analysis methodology documentation. Identified full attacker infrastructure and exfiltration mechanisms.

APK AnalysisMobSFCERT-INAndroid
Request Case Study →
OSINT Tool2024

DorkRaptor

Automated Google Dorking tool for OSINT and reconnaissance — streamlines discovery of exposed files, login panels, sensitive directories, and vulnerable parameters across target domains during security assessments.

PythonOSINTGoogle DorksRecon
View on GitHub →

Security Research & Labs

Open-source security projects built to educate, demonstrate attack techniques, and give newcomers a safe space to practise hacking legally.

Phishing Simulation grambait.abbytes.in

GramBait

A phishing simulation project that mimics a social platform's login flow — built purely for educational understanding of how credential phishing attacks are constructed, hosted, and detected. A practical reference for blue teamers and security researchers.

Vulnerable Lab hackdrac.abbytes.in

HackDrac

An intentionally vulnerable web application for aspiring security professionals to legally practise common attack techniques — SQLi, XSS, IDOR, broken auth, and more. A safe, structured environment to build offensive skills from scratch.

Blog

Security research, technical writeups, and practical guides on offensive security and emerging threats.

Start a Project

Looking for a security assessment, audit, or a quick consultation? I work with clients worldwide — reach out and I'll respond within 24 hours.

Delhi / NCR, India — Remote Worldwide
Responds within 24 hours
Worldwide engagements welcome