Initializing system...
Loading security protocols...
Checking your IP ...
Establishing secure connection...
> System ready in 7s
You found my secret! Here's a special message just for you:
"The quieter you become, the more you are able to hear." - Kali Linux motto
Try typing the Konami code (↑↑↓↓←→←→BA) anywhere on the page for a surprise!
whoami
Roshan Ajith (CyberJarvis) - Computer Engineering Student
bio
I'm a 2nd-year BE Computer Engineering student at SIES Graduate School of Technology, passionate about technology and eager to learn. I am a fast learner with hands-on experience in Cybersecurity and web development. I have worked on multiple cybersecurity tools using Python, enhancing my technical skills and deepening my interest in ethical hacking and cybersecurity. I'm also interested in Web development and Artificial Intelligence.
personal_details
Date of Birth
22nd September 2005
Languages
English, Hindi, Tamil, Malayalam
Location
Maharashtra, India
Contact
roshanajith2005@gmail.com
education
SIES Graduate School Of Technology
Bachelor of Engineering - BE, Computer Engineering · (August 2023 - August 2027)
CGPA: 8.3
Ryan International School
High School · (June 2021 - April 2023)
Mahatma International School
(March 2010 - March 2021)
skills --expertise --certifications
Python, C, Java
HTML, CSS, JavaScript
Ethical Hacking, Web Pentesting, Network Security
Neural Networks, GenAI
projects --list --detailed
Developed a comprehensive AI-powered desktop assistant with both voice and text command capabilities, tailored for cybersecurity, productivity, and system management.
Developed a file scanning tool that computes SHA-256 hash for files and integrates with VirusTotal API for malware detection.
Developed a basic encryption tool implementing the shift cipher algorithm for text encryption and decryption.
Created a tool for encrypting and decrypting image files using cryptographic algorithms.
Developed a tool to analyze and evaluate password strength based on various security parameters.
Created a basic keylogger for educational purposes to understand system vulnerabilities.
threat_map --live --global
New ransomware variant detected targeting healthcare systems
2 hours ago | Severity: High
DDoS attack on financial sector infrastructure
5 hours ago | Severity: Medium
Zero-day exploit in popular CMS platform
8 hours ago | Severity: Critical
encryption_demo --interactive
This demo uses a Caesar cipher, one of the simplest and most widely known encryption techniques.
Each letter in the plaintext is shifted a certain number of places down or up the alphabet.
For example, with a shift of 3:
A → D
B → E
... and so on.
While not secure for modern encryption needs, it demonstrates the basic principle of substitution ciphers.
blog --latest --cybersecurity
A deep dive into zero-day exploits, how they're discovered, and why they're so dangerous to cybersecurity infrastructure.
Exploring the latest in password security best practices, password managers, and why "Password123" is still a bad idea.
terminal --interactive --help
experience --timeline --detailed
Cybersecurity Coordinator
Extended Open Source Contributor
Cybersecurity Intern
> contact --secure-channel