Pentester · CTF Player · Security Researcher

Adarsh SR.

Security analyst with hands-on experience in real-world web application pentesting and vulnerability research.

Adarsh SR

I'm Adarsh SR, a cybersecurity practitioner and competitive CTF player with a sharp focus on web application penetration testing, vulnerability research, and offensive security. Currently pursuing a Bachelor's in Computer Applications at Yenepoya University, Bangalore.

I'm the founder of TRIADA — one of India's top 1% competitive CTF teams. I've designed and deployed 30+ challenges across web, reverse engineering, cryptography, and forensics for live competitions.

I'm also a core team member at VULNCON, a national-level cybersecurity conference dedicated to vulnerability research and offensive security — contributing to design, web presence, and event operations.

What I do

Three things, done with rigor.

A narrow focus on offensive security — from live engagements to competitive research to event execution.

01

Web Application Pentesting

I identify and validate real-world vulnerabilities — broken authentication, IDOR/BOLA, access control flaws, and logic bugs — and deliver structured reports with proof-of-concept and clear remediation guidance.

OWASP Top 10 IDOR / BOLA Auth Bypass Logic Flaws
02

CTF Research & Competition

Active competitor in international CTF competitions across web exploitation, reverse engineering, cryptography, and forensics. I don't just solve — I build and organize.

Web Exploit Reverse Eng Crypto Forensics
03

Security Event Design

End-to-end design and execution of large-scale CTF competitions — from challenge creation and infrastructure to sponsor coordination and event management.

Challenge Design Infra Sponsor Ops Execution

Experience

The work I've done.

Practical experience across offensive security engagements, team leadership, and event organization.

Security Analyst

April 2026

Confidential

  • Conducted a web application security assessment on a scheduling and field operations platform serving utility infrastructure
  • Identified broken authentication chains across multiple token tiers
  • Discovered cross-account data access via IDOR and BOLA vulnerabilities
  • Found unauthenticated write access to internal services
  • Reported sensitive operational configuration disclosure on production

Founder & Team Lead

2024 – Present

TRIADA CTF Team

  • Founded one of India's top 1% CTF teams — CTFtime India ~#43, Global ~650
  • Active in international competitions: UTCTF, DiceCTF, HackIM (Nullcon), UIUCTF
  • Designed and deployed 30+ CTF challenges across web, RE, crypto, and forensics
  • Organized TRIADA CTF '25 and '26 — 125+ participants, ₹4.3L+ prize pool
  • Built and deployed a custom CTFd platform for live competitions

Core Team

Ongoing

VULNCON

  • Part of the organizing core team for a national-level cybersecurity conference focused on vulnerability research and offensive security
  • Contributing to design, web presence, and event operations

Team Triada

Team Lead of TRIADA - one of India's top competitive CTF teams.

CTF's Organized

3

Total Participants

350+

Challenges Designed

30+

Total Prize Pool

₹5.3L+

01

Active in international competitions: UTCTF, DiceCTF, HackIM (Nullcon), UIUCTF, and more

02

Designed and developed 30+ CTF challenges across web, reverse engineering, cryptography, and forensics

03

Built and deployed a full-stack CTF platform used in live competitions

Events organized

TRIADA CTF '25

Event

Organized the first Capture The Flag competition at Yenepoya University — establishing a competitive cybersecurity culture within the institution and scaling to an inter-college format.

100+ participants across India
₹1L+ prize pool

TRIADA CTF '26

Event

Organized a 24-hour offline duo-format CTF competition.

125+ participants across India
₹4.3L+ prize pool
Sponsors: OtterSec, Lorikeet Security, BlackPerl, APIsec University
Full ownership of challenge design, infrastructure, and event execution

Projects

What I've shipped.

Focused, purpose-built tools and platforms used in real engagements and competitions.

Project / 01 Public

DorkIQ

A focused Google dork generator that automates targeted reconnaissance queries for any domain — built for fast, effective recon during security assessments.

ReconOSINTPython
Project / 02 Public

Vulnerable Web Application

A custom-built intentionally vulnerable platform for practicing and demonstrating real-world web exploits — SQL Injection, XSS, IDOR, SSRF, and file upload vulnerabilities.

SQLiXSSIDORSSRF
Project / 03 Internal

SOC Automation Toolkit

Python-based security automation toolkit built for SOC workflows during a TCS engagement. Log parsing, anomaly detection, threat-intel enrichment (AbuseIPDB, VirusTotal, OTX), and automated HTML reporting.

SOCThreat IntelAutomation
Project / 04 Internal

CTF Platform - TRIADA CTF '26

Custom deployment of CTFd v3.8.2 powering TRIADA CTF '26. Fully redesigned UI, tiered sponsor integration, Easter egg challenge flag, and custom frontend enhancements — serving 125+ participants across a 24-hour competition.

CTFdInfraFrontend

Achievements

Where I've placed.

1st Runnerup

Threat Hunting CTF, Seasides Goa

2nd Runner-up

Seasides Offline CTF 2026

2nd Runner-up

BSides Bangalore CTF

5th Place

bi0s CTF

Writeups

Notes from the trenches.

I publish detailed technical writeups covering CTF challenge solutions and vulnerability research. Each writeup breaks down the approach, exploitation path, and key takeaways — written to be useful, not just correct.

Contact

Let's work together.

Available for web application pentests, CTF design, and security consulting. Feel free to reach out for collaborations, engagements, or just to say hi.