OPEN TO JOBS & INTERNSHIPS

Chiranjeevi Diviti

Cybersecurity engineer specializing in penetration testing, red teaming, web app pentesting, AD pentesting, cloud security, digital forensics, and blockchain security. Building robust defenses and hunting threats across complex environments.

4
Certifications
3+
Projects
9+
Languages
10+
Tools
chiranjeevi@darknode ~ $
cat whoami.json
{
  "alias": "chiru",
  "role": "Red Team Operator",
  "certs": ["Sec+","Net+","AWS SA","DFIR"],
  "tools": "DarkNode C2, TakeoverX",
  "status": "Available"
}
ls projects/
DarkNode-C2  TakeoverX
./DarkNode/setup.sh 
About

Who Am I

I'm a Cybersecurity & Blockchain engineering student at Lovely Professional University, driven by a passion for breaking, building, and securing systems.

My work spans red team operations, web application pentesting, Active Directory attacks, cloud security assessments, and digital forensics & incident response. I author open-source security tooling — including a full C2 framework and a subdomain takeover scanner.

When I'm not hunting vulnerabilities, I'm deepening my knowledge of reverse engineering, blockchain security, and adversarial simulation techniques.

Core Focus Areas
Red Team Operations & C2 Frameworks
Web Application Pentesting
Active Directory Pentesting
Cloud Security (AWS)
DFIR — Digital Forensics & IR
Blockchain & Smart Contract Security
Soft Skills
Leadership Problem-Solving Team Player Communication Adaptability
Skills

Tech Arsenal

Languages
C C++ Java Python SQL Bash Solidity Go Rust
Offensive Tools
Wireshark Nmap Metasploit Burp Suite Pacu Ghidra IDA Pro Binary Ninja Any.run YARA
DevOps & Cloud
Git GitHub Docker Linux Windows AWS
Security Domains
Red Teaming Web Pentesting AD Pentesting Cloud Security Vuln Assessment DFIR Network Security Blockchain Sec
Projects

My Operations

▶ 2026 — PRESENT
DarkNode C2 Framework
  • Professional open-source Command & Control framework for red team operations — lightweight agents, mTLS-encrypted comms, gRPC/WebSocket/DNS transport channels, and a rich React web UI.
  • Features native remote desktop (no VNC/RDP required), SOCKS5 proxy, port forwarding, keylogger, in-memory execution, credential harvesting, and multi-operator RBAC with audit logging.
  • Supports multi-platform agents with auto-persistence across Linux, Windows & macOS, optional garble obfuscation, UPX packing, and a web-based payload builder with 6 dropper stager types.
  • Architecture: Go teamserver + React/Vite UI + Operator CLI — competes feature-for-feature with Cobalt Strike at zero cost.
Go React gRPC Red Team C2 Post-Exploitation OPSEC
▶ 2025 — PRESENT
TakeoverX — Subdomain Takeover Scanner
  • High-performance subdomain takeover scanner written in Go with 51+ cloud service fingerprints — AWS S3, GitHub Pages, Heroku, Netlify, Vercel, Azure, Firebase, Cloudflare & more.
  • Multi-level CNAME chain analysis, false-positive prevention via retry verification, configurable worker pool, rate limiting, and three discovery modes: single domain, wordlist scan, bruteforce.
  • Supports JSON, CSV, and dark-theme HTML pentest report output. Integrates cleanly with Subfinder, Amass & other recon pipelines.
Go Bug Bounty Recon Subdomain Takeover DNS Cloud Security
Education & Training

My Background

Education
AUG 2023 — PRESENT
Lovely Professional University
B.Tech CSE — Cyber Security & Blockchain
Jalandhar, Punjab
APR 2021 — MAR 2023
Narayana Junior College
12th Science
Anantapuram, Andhra Pradesh
Training
JUN 2025 — JUL 2025
Linux System Administration
Lovely Professional University
  • Red Hat Linux (RH124 & RH134) — user management, file systems, permissions, networking & service configuration.
  • Configured and deployed VMs & networks using Apache CloudStack.
  • Mastered troubleshooting, monitoring & automation of Linux server tasks for reliability & security.
Contact

Get In Touch

>_ Open to full-time jobs, internships & security research collaborations.