Hi, I’m Neeraj Singh.

Cyber Security enthusiast

Specialized in Cyber Security and Software Testing

About-Me ( )

My name is Neeraj Singh (author of Neerajlovecyber.com) . A budding a Cybersecurity Enthusiast, who wants to build a carrier in cybersecurity and loves to play CTFs , HackTheBox and TryHackMe. I am always eager to learn and develop myself.

<Nationality />

indiac logo png transparent

India

< Education />

Lovely Professional University logo

Lovely Professional University

<languages/>

hindi english removebg preview

English / Hindi

Tech Stack

The dev tools, apps, Technologies, and games I use and play.

github 1
python
git
wordpress
Vite.js
Bash
Cloudflare
C CPlusPlus
Debian
Digital Ocean
Docker
GitHub Actions
Heroku
Java
Karate Labs
Apache Maven
NPM
Powershell
Postman
PyCharm 1
Rust
Splunk
Tauri 1
Apache Tomcat
Selenium
pngegg
icons8 kali linux 48
icons8 metasploit 48
tor
wireshark
bursuite
restassured

My Latest Blogs

Stay Ahead: Cybersecurity and Dev Blogs

essential NetBIOS enumeration cheat sheet

NetBIOS Enumeration (135, 137-139, 445) Cheat Sheet: Essential Commands, Tools for Pentesters

What is NetBIOS? NetBIOS (Network Basic Input/Output System) is a legacy networking protocol that allows computers on a local area …

cheatsheetHacktheboxtools
Basic Nmap Commands for CEH practical

Quick Nmap Commands For CEH / HTB / TryHackMe

My Personal Favorite nmap -A -p- -T4 -v 192.168.1.0 Host Discovery Tip: Use these commands to identify which hosts are …

cheatsheetctfHacktheboxnmaptools
rdt

Raw Dump Tool: A Ram Dumping Tool For Windows

Raw Dump Tool In the realm of digital forensics, the ability to extract and analyze volatile memory (RAM) contents is …

mongodbpythonqt
View All Blogs

Projects

Projects and Ideas i have Worked on

rdt

Raw Dump Tool: A Ram Dumping Tool For Windows

Raw Dump Tool In the realm of digital forensics, the ability to extract and analyze volatile memory (RAM) contents is paramount. To aid digital forensics investigators in this critical task, Neeraj Singh has created the Raw Dump Tool – a Python-based Graphical User Interface (GUI) …

mongodbpythonqt
home

QA WatchDog : A QA Checklist Project with Python and QT

QA WatchDog Quality Assurance (QA) testing is an essential part of software development, ensuring that the final product meets the desired quality standards. However, managing QA test checklists and collaborating effectively among team members can often be a challenging task. This is where QA WatchDog …

mongodbpythonqt
Source Codes

Certificates

Skillset Showcase

1730983549605

Certifed Ethical Hacker (CEH)

The CEH Practical (Certified Ethical Hacker Practical) is an advanced-level certification that emphasizes hands-on expertise in ethical hacking. It focuses on real-world scenarios and techniques, testing the candidate’s ability to identify vulnerabilities and secure systems effectively.
Achieving the CEH Practical certification demonstrates proficiency in advanced penetration testing skills, including reconnaissance, vulnerability assessment, exploitation, and post-exploitation analysis. It validates the ability to apply ethical hacking methodologies in a practical and professional environment.

PenTest Network CEH
ElearnSecurity-Juniour-penetration-Tester

ELearnSecurity Junior Penetraion Tester

EJPT (eLearnSecurity Junior Penetration Tester) is an entry-level certification focusing on penetration testing skills. It covers essential techniques and tools used by penetration testers to identify and exploit vulnerabilities in web applications and networks.

Achieving EJPT certification demonstrates proficiency in foundational penetration testing concepts and practices

PenTest Network EJPT
unnamed
InfoSys

Database Management System Part – 1

View
Sql Database DBMS
vrb9yt0hpbyszpsewjwc
TryHackMe

Jr. Penetration Tester & Introduction to CyberSecurity

View View
PenTest Network

Neeraj ♥️ Cyber

Just a simple Blog Made with ♥️ for Cyber Security Enthusiasts. We provide CTF, HackTheBox and TryHackMe write ups and information about various Cybersecurity tools, Cheat sheets and cybersecurity fields like forensics, cryptography, reverse engineering, Stenography, web,Penetration testing , windows and Linux privilege escalation etc.