👨💻 About Me
Hello! I’m Himangshu Pan — a Python developer turned offensive security researcher, currently rebuilding my path in cybersecurity after several years of backend and blockchain development.
🛤 Career Timeline
🧑🏫 2015–2016: Education & Training Roots
- Started as a contract trainer for the CCTNS project, digitizing police departments under a Government of India initiative.
- Taught computer fundamentals and programming basics at Unique Computer Academy.
🐍 2016–2018: Python & Data Engineering
- Joined AQB Solutions Pvt. Ltd. as a Python developer.
- Built data crawlers, worked with PDF parsing, and handled structured data pipelines.
- Developed backend logic and gained production experience in Python development.
- In 2018, earned my CEH (Certified Ethical Hacker) certification, laying the foundation for a future in InfoSec.
⛓️ 2019–2024: Blockchain & Backend Focus
Though I earned my CEH in 2018, I couldn’t shift into InfoSec due to practical limitations. I continued to grow as a developer.
- Joined Klizo Solutions Pvt. Ltd. in 2019, where I was introduced to blockchain technologies like Hyperledger Indy and Aries, building decentralized identity solutions.
- After 2021, I began freelancing:
- Created and deployed Secret Invoice on the Secret Network
- Contributed to Emprops, an NFT + AI platform, focusing on backend logic and test coverage
- These experiences deepened my knowledge of secure system design, even while working outside formal cybersecurity roles.
🔁 2025 Onwards: Back to Security
In Q2 of 2025, I made a deliberate return to the field of cybersecurity, this time with focused intent and technical maturity.
I’m currently diving deep into:
- Offensive security techniques — privilege escalation, enumeration, exploitation
- Recon automation tools using Python
- Vulnerability research, basic binary analysis, and system hardening
- Practicing through labs, write-ups, and CTFs
My long-term goal is to become a skilled offensive security researcher—someone who understands systems deeply and helps secure them by thinking like an attacker.
⚙️ Tools I Work With
Python
• Linux
• Burp Suite
• Nmap
• Wireshark
• Gobuster
• Hydra
• Nikto
• VMware
• tcpdump
• Ghidra
• Metasploit
• ffuf
• binwalk
🧭 What Drives Me
- Breaking things to learn how they work—and how to defend them
- Automating tedious recon tasks with custom Python scripts
- Exploring vulnerability research and low-level attack surfaces
- Sharing everything I learn through blogs and community involvement
Thanks for reading! If you’re getting into InfoSec, working on real-world attacks and defenses, or just love building security tools—reach out and say hi.