Likith Aswathanarayana

Hi, I’m Likith Aswathanarayana

I'm a

Cybersecurity researcher focused on offensive security, detection engineering, and CTF problem solving. Passionate about automation, reverse engineering, and secure system design.

Download Resume

About

I’m a passionate cybersecurity learner and hands-on practitioner exploring the realms of offensive security, detection engineering, and digital forensics. My journey began with curiosity about how systems break — and gradually evolved into understanding how to defend and strengthen them.

Over time, I’ve been actively building and experimenting with projects like SmartBruteRL, a reinforcement learning–based password prediction tool, and Snapper, a CLI-focused Man-in-the-Middle (MITM) utility for ARP spoofing and packet analysis.

I’ve also participated in CTFs and lab environments such as TryHackMe, Hack The Box, and Metasploitable, where I continually test and refine my practical skills in exploitation, privilege escalation, and network forensics.

My focus right now is on bridging the gap between red teaming and blue teaming — learning how attackers think while also understanding how defenders can detect, respond, and mitigate threats effectively.

Skills

Projects

SmartBruteRL

Reinforcement learning-based password spraying tool that predicts password patterns for web and service logins.

View Project →

Snapper (MITM Tool)

CLI tool for ARP spoofing, packet sniffing, and live manipulation during network interception.

View Project →

Cerebus

An intelligent password auditing tool with generative scoring models for entropy analysis.

View Project →

Sentinel IDS

Lightweight intrusion detection system built in Python with rule-based packet analysis.

View Project →

Certifications

Google Cybersecurity Professional Certificate

Completed foundational cybersecurity concepts, SOC workflows, and practical lab exercises.

Wireshark Guided Project (Coursera)

Packet capture and analysis for cybersecurity investigations and network event correlation.

Metasploit Hands-on Training

Exploit development, payload delivery, and post-exploitation workflows in controlled labs.