Offensive and defensive cybersecurity — unified under one roof. Red team, blue team, threat intelligence, and real-world SOC operations. Built in India for India's threat landscape.
India-focused threat intelligence — APT tracking, malware analysis, IOC feeds, and research tailored to the Indian threat landscape. Published openly for the community.
Active — Research PhaseReal-world SOC operations and training on the Microsoft security stack. Not certifications — actual incident simulations. Closing the gap between paper and practice.
Coming 2027Penetration testing, red team operations, and bug bounty research. Finding vulnerabilities before adversaries do — responsible disclosure and detailed reporting.
Coming 2027Ekaraksha — Eka (one) + Raksha (protection). We believe offensive and defensive security are two sides of the same shield. Our red team understands how attackers think. Our blue team knows how to stop them.
We started with research because you cannot defend what you don't understand. Every service we build is grounded in intelligence — Indian context, real threats, no shortcuts.
Our StoryPublishing threat intel, malware analysis, and APT deep dives. Bug bounty research runs in parallel.
Cohort-based SOC training on real-world scenarios. SOC-as-a-service for Indian organisations launches alongside.
Structured penetration testing and red team engagements for Indian companies.
A threat intelligence platform for the Indian context — regional APTs, India-specific IOCs, and a community of Indian security researchers.
SOC analyst and threat intelligence researcher with hands-on experience across the Microsoft security stack. Specialist in identity, endpoint, and email threat investigation — Sentinel, MDE, Defender for Office 365, Entra ID, and MDCA. CDSA certified via Hack The Box. Teaching SOC operations and building the next generation of defenders.
Offensive security specialist focused on red team operations, penetration testing, and bug bounty research. Finding vulnerabilities before adversaries do — responsible disclosure and detailed reporting. The red team's insights directly inform the blue team's detection capabilities, creating a feedback loop that makes both sides stronger.
Whether you need threat intelligence support, want to collaborate on research, or are interested in our upcoming services — we read every message.