Young Malware Researcher skilled in reverse engineering, ethical hacking, VAPT, and AI-driven cybersecurity. Certified Ethical Hacker (CEH), Cyber Analyst, and Full-Stack Developer with 5+ years of experience building secure, scalable, and innovative digital systems. Creative Technologist passionate about blending security, design, and innovation.
I'm Rupesh Khadka, a young malware researcher with a deep curiosity for how things work beneath the surfaceβespecially when it comes to code and systems. My focus lies in reverse engineering, exploit analysis, and detection evasion techniques, where I constantly seek to uncover hidden threats and develop smarter ways to defend against them.
Alongside my work in cybersecurity, I'm building my expertise as a machine learning engineer. I explore how machine learning models can be used for malware detection, behavioral analysis, and proactive threat mitigation. This intersection of AI and security drives much of my current research and learning.
I have a strong foundation as a cybersecurity professional with hands-on experience in ethical hacking, penetration testing, and participating in CTF (Capture The Flag) competitions. These experiences sharpened my problem-solving skills and deepened my understanding of real-world attack vectors.
Advanced ML algorithms for threat detection and malware classification
Cybersecurity solutions for smart healthcare and IoT medical devices
AI-driven cognitive approaches to identify and mitigate cyber threats
Distributed learning systems for collaborative threat intelligence
Advanced penetration testing methodologies and automation
Real-time server monitoring and anomaly detection systems
Machine learning-based malware detection system using behavioral analysis and static analysis techniques.
Comprehensive penetration testing framework with automated vulnerability scanning and reporting.
Full-stack e-commerce platform with advanced security features and payment integration.
Real-time network traffic analysis tool with anomaly detection and security monitoring.
Full-stack cryptocurrency portfolio management with real-time price tracking and analytics.
Collection of tools for malware reverse engineering, binary analysis, and exploit development.
Custom Nmap automation tool with advanced scanning techniques and vulnerability detection.
Automated payload generation and deployment system using Metasploit Framework and MSFvenom.
Advanced network packet analysis tool with automated threat detection and protocol analysis.