Hi, I'm Neeraj Singh.
Cybersecurity Engineer
Specialized in Cyber Security, Software Testing and Developement I'm Neeraj Singh Panghal, currently working as a Cybersecurity Engineer . I have hands-on experience with security assessments, CTFs, HackTheBox, and TryHackMe challenges. Passionate about implementing robust security solutions.
Technologies I Use
Some of the technologies I've worked with:
Professional Experience
A brief overview of my professional journey in cybersecurity and software testing
Cyber Security Intern
xIoTz, Bengaluru CurrentContributed to the development of xIoTz eXtended Operation Centre (XOC), a unified cyber assurance platform integrating NOC, SOC, TOC, CSPM, and NGVA. Worked on automated threat Detection & responses and integrated Wazuh for security monitoring.
SDET Intern
Frugal Testing, HyderabadAutomated web/API testing using Java, Selenium, and Postman. Improved CI/CD with GitHub Actions. Used JIRA, Trello, and Allure for reporting and defect tracking.
Cyber Security Intern
Gurugram PoliceWorked on real-world cases in bug hunting, digital forensics, OSINT, and cyber law. Performed penetration testing with tools like Nmap, BurpSuite, and Metasploit.
Achievements & Certifications
My professional accomplishments and credentials
Featured Projects
Check out some of my latest work in cybersecurity and software development
WhatMyServerDoing : Server Monitoring Tool
A tool to monitor server activity and performance in real-time.
QA WatchDog : A QA Checklist Project with Python and QT
A Python-based tool designed to simplify QA testing with secure multi-user login, easy installation, and organized test checklists.
Raw Dump Tool : Effortless Data Extraction
A tool for extracting and dumping raw data from various sources quickly and efficiently.
Cipher Decoders & Encoders
Online tools to encode and decode various ciphers. Perfect for CTF challenges, cryptography puzzles, and learning about different encryption methods.
Bill Cipher Encoder/Decoder
.CZwgU4XS.png)
.DxTOtdSG.png)
.SmL5F4oQ.png)
.BuOMEzTU.png)
.7_kOC2JO.png)
Encode and decode messages using the Bill Cipher, a substitution cipher from the show Gravity Falls.
Birds on a Wire Cipher Encoder/Decoder





Encode and decode messages using the Birds on a Wire Cipher, a substitution cipher where letters are...
Chinese Code Cipher Decoder
.DgE8n3lY.png)
.DOgYv6WN.png)
.BxXQzGnp.png)
.Dv09KU6X.png)
.CnqCplZV.png)
Decode messages using the Chinese Code cipher, a unique scout code based on intersecting vertical an...
Daggers Alphabet Cipher Encoder/Decoder
.D1PqRfkP.png)
.B-M0EuXq.png)
.C6Rfa3ov.png)
.CmCV6s4a.png)
.C4TCf3h-.png)
Encode and decode messages using the Daggers Alphabet cipher, a substitution cipher that uses dagger...
Dancing Men Cipher Encoder/Decoder
.DU64Ue1L.png)
.DcO192XZ.png)
.xwNOye9_.png)
.B-EoFV0G.png)
.wj3lGFdC.png)
Encode and decode messages using the Dancing Men Cipher, a substitution cipher from the Sherlock Hol...
Enderwalk Language Encoder/Decoder
._7KfTqUD.png)
.BGfvr60d.png)
.UdUBr1Ic.png)
.C94ioTvS.png)
.CHxRUgE9.png)
Encode and decode messages using the Enderwalk Language cipher, a mysterious alien-like script inspi...
Latest Blog Posts

Linux Find Command Cheatsheet
Master the Linux find command with this comprehensive cheatsheet. Learn essential search patterns, filters, and advanced techniques for file system navigation.

NetBIOS Enumeration Cheatsheet
NetBIOS Enumeration Cheatsheet - Comprehensive guide to NetBIOS enumeration with practical commands and techniques for hackers.

Symbol Ciphers in CTF Challenges: A Complete Guide to Decoding Visual Cryptography
Master symbol ciphers in CTF competitions with this comprehensive guide covering Pigpen, Wingdings, Dancing Men, and other visual cryptography techniques used in cybersecurity challenges.
Latest News
Stay updated with the latest news in cybersecurity and technology.

EU’s Push to Ditch Microsoft: A Boost for Linux or a Risky Gamble?
The EU is increasingly phasing out Microsoft products in favor of Linux and open-source software. Explore why this shift is happening, its potential to boost open source, and why it might fail.

Ubuntu 24.10 “Oracular Oriole” Reaches End of Life, Upgrade to Ubuntu 25.04 Now
Ubuntu 24.10 “Oracular Oriole” reached end of life on July 10, 2025. Canonical urges users to upgrade to Ubuntu 25.04 “Plucky Puffin” for continued security and software updates. Learn how to upgrade now.
Want to work
together?
I'm always open to discussing cybersecurity projects and opportunities.
Let's connect and make the digital world more secure!