_

I'm Dhanvinesh K Application Security Engineer

AppSec Engineer at Snapdeal. I secure web, API, Android, and cloud systems โ€” focusing on business-logic flaws, authorization issues, and real-world abuse paths that automated tools miss.

โ— Security Engineer @ Snapdeal
Web & API Security
Android Security
Cloud Security
Dhanvinesh K
0
High-Impact
Vulns Found
0
Secure Code
Reviews
0
Bug Bounty
Reports Triaged
0
Threat Intel
Alerts Handled
0
Services
Secured

Recent Activity

View all posts โ†’
Security Platforms
TryHackMe TryHackMe

Top 1% ยท 0xD LEGEND

View Profile โ†’
Hack The Box Hack The Box

Rank: Hacker

View Profile โ†’
OffSec OffSec

Public Profile

View Profile โ†’
Work History

Experience & Education

APR 2026 โ€” PRESENT
Security Engineer I
Current
Snapdeal

Application security engineering at one of India's leading e-commerce platforms. Securing web, API, and mobile surfaces across the product stack.

AppSec API Security E-commerce
FEB 2024 โ€” MAR 2026
Security Analyst II ยท Progressed from Intern
2 yrs
MobiKwik

Led application & API security testing across 50+ services, identifying 30+ high-impact business logic, authorization, and fintech-specific flaws including privilege escalation. Performed secure code reviews on 800+ changes and developed custom test cases beyond OWASP Top 10. Assessed 300+ servers using Nessus/Qualys; contributed to cloud security testing and Golden AMI hardening. Built automation to detect exposed dashboards and actuator endpoints. Enhanced Cloudflare WAF posture via ASN filtering and rule tuning. Led bug bounty triage (200+ reports) and handled 6,000+ threat intel alerts.

Fintech AppSec Secure Code Review Cloudflare WAF Nessus / Qualys Bug Bounty Triage Threat Intel AWS / GCP
2020 โ€” 2024
B.Tech โ€” Computer Science & Engineering
First Class with Distinction
Amrita Vishwa Vidyapeetham ยท Cybersecurity Specialization

Specialized in cybersecurity alongside core CS fundamentals. Published two research papers on CTF methodology and cloud/edge computing security. Active CTF competitor throughout, winning national and international competitions.

Cybersecurity Specialization Research Papers CTF Competitions
What I do

Core Expertise

Application Security

Web & API Pentesting95%
Business Logic & AuthZ Flaws90%
Android Application Security80%
Secure Code Review88%

Cloud & Infrastructure

AWS / GCP78%
Server Hardening & Golden AMI80%
Docker / Kubernetes70%
Cloudflare WAF / Akamai82%

Tools & Automation

Python / Bash Automation92%
Burp Suite / Frida90%
Nessus / Qualys / Fortify82%
SAST / DAST / CI-CD Security78%
Credentials

Security Certifications

Certified Ethical Hacker (CEH v12)
Verified
EC-Council
Cert ID CEH-XXXX-XXXX
Verify on EC-Council โ†’
Certified in Cybersecurity (CC)
Verified
(ISC)ยฒ
Candidate ID ISC2-XXXXXX
Verify on (ISC)ยฒ โ†’
eJPT v2 โ€” Junior Penetration Tester
Verified
INE Security
Certificate ID INE-eJPT-XXXX
Verify on INE โ†’
INE Certified Cloud Associate
Verified
INE Security
Focus Cloud Security
Verify on INE โ†’
Cybersecurity 101 (SEC1)
Verified
TryHackMe
Platform Rank Top 1% ยท 0xD LEGEND
View on TryHackMe โ†’
Built by me

Projects

๐Ÿ”ฌ
GrimTunnel

Fully automated VPN-based invisible proxy to intercept mobile app traffic, bypassing traditional proxy restrictions. Integrates OpenVPN, iptables, and Burp Suite for full traffic capture across iOS and Android apps.

OpenVPNiptablesBurp SuiteAndroidiOS
๐Ÿฐ
Cyber Maze Arena

Security learning platform simulating real-world exploitation paths with guided remediation. Covers Web Exploitation, Cryptography, Reverse Engineering, OSINT, and Steganography โ€” from novice to advanced.

Web ExploitationCryptoRev EngOSINT
โšก
Automated Exploiter

Python3 + Metasploit-powered framework to automate vulnerability scanning and exploitation across Linux/Windows environments. Streamlines PoC development for penetration testing engagements.

Python3MetasploitLinuxWindows
โ†‘
$
Press Esc to close ยท โ†‘โ†“ to navigate ยท Enter to run
๐Ÿ›ก๏ธ
Ask about Dhanvinesh
โ— AI ยท Powered by Groq
Hey! Ask me anything about Dhanvinesh โ€” his skills, experience, projects, or how to reach him. ๐Ÿ‘‹
  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— 
  โ–ˆโ–ˆโ•”โ•โ•โ•โ•โ• โ–ˆโ–ˆโ•”โ•โ•โ•โ•โ• โ–ˆโ–ˆโ•”โ•โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•”โ•โ•โ•โ•โ• โ–ˆโ–ˆโ•”โ•โ•โ•โ•โ• โ–ˆโ–ˆโ•”โ•โ•โ•โ–ˆโ–ˆโ•—
  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•
  โ–ˆโ–ˆโ•”โ•โ•โ•  โ–ˆโ–ˆโ•”โ•โ•โ•  โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ•šโ•โ•โ•โ•โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ•โ•โ•  โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—
  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•‘  โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•‘  โ–ˆโ–ˆโ•‘
  โ•šโ•โ•โ•โ•โ•โ•โ•โ•šโ•โ•โ•โ•โ•โ•โ•โ•šโ•โ•  โ•šโ•โ•โ•šโ•โ•โ•โ•โ•โ• โ•šโ•โ•โ•โ•โ•โ•โ•โ•šโ•โ•  โ•šโ•โ•
    
r34p3r mode you found the easter egg