GOKUL AMARAN S
Cyber Security Engineer | Offensive Security
System Profile
A comprehensive overview of my background, experience, and professional focus.

Gokul Amaran S
Cyber Security Engineer
Red Teaming & Threat Analysis
I am a passionate Cyber Security Engineer with highly specialized hands-on experience in uncovering critical vulnerabilities and strengthening network defenses before threat actors can exploit them.
My journey in tech began with an intense curiosity about how systems operate at their core—and how they can be broken. Today, I specialize in Bug Hunting and simulating Advanced Persistent Threats (APT).
When not engaged in active operations, I actively explore emerging cybersecurity trends, and learn new technologies to enhance my skill-set.
15+
CTFs Conquered
5+
Vulns Disclosed
Current Status
OPEN TO WORK
Technical Capabilities
An overview of my technical expertise, tools, and methodologies.
Offensive Security
Security Tools & Frameworks
Infrastructure & Networking
Programming Language
Featured Projects
A selection of my recent cybersecurity and development projects.
Fluxion
Security FocusedEncrypted File Sharing Platform
An end-to-end encrypted file sharing platform utilizing AES-256-GCM and RSA-2048 to ensure absolute zero server-side data exposure. Features decentralized peer-to-peer communication via WebRTC.
Achievements & Disclosures
A record of my responsible disclosures, vulnerabilities identified, and key milestones.
Ethical Hacking Contribution
Responsible Disclosure: Identified Authentication Bypass vulnerability (jackjones.in – Bestseller Group). Acknowledged by the organization's security team.
Vulnerability Acknowledgment: Versuni
Vulnerability report acknowledged and validated by the security team at Versuni, contributing to the security of their platforms.
Capture The Flag
Highlights from competitive cybersecurity challenges and Capture The Flag events.
Offensive Operations
Participating in competitive cybersecurity Capture The Flag (CTF) environments. Specializing in vulnerability exploitation, cryptography, and offensive security methodologies against hardened infrastructure.
Primary Vectors
Team Cyb3rs3c
Verified Credentials
A selection of my industry certifications and verified professional credentials.
Initiate Connection
Open for opportunities, collaborations, and discussions.