
SMTP Enumeration and Pentesting Guide for Email Server Security
Learn comprehensive SMTP penetration testing techniques including banner grabbing, user enumeration, and brute force attacks to identify and secure email server vulnerabilities.
Specialized in Cyber Security, Software Testing and Developement I'm Neeraj Singh Panghal, currently working as a Cybersecurity Engineer . I have hands-on experience with security assessments, CTFs, HackTheBox, and TryHackMe challenges. Passionate about implementing robust security solutions.
Some of the technologies I've worked with:
A brief overview of my professional journey in cybersecurity and software testing
Contributed to the development of xIoTz eXtended Operation Centre (XOC), a unified cyber assurance platform integrating NOC, SOC, TOC, CSPM, and NGVA. Worked on automated threat Detection & responses and integrated Wazuh for security monitoring.
Automated web/API testing using Java, Selenium, and Postman. Improved CI/CD with GitHub Actions. Used JIRA, Trello, and Allure for reporting and defect tracking.
Worked on real-world cases in bug hunting, digital forensics, OSINT, and cyber law. Performed penetration testing with tools like Nmap, BurpSuite, and Metasploit.
My professional accomplishments and credentials
Check out some of my latest work in cybersecurity and software development
A tool to monitor server activity and performance in real-time.
A Python-based tool designed to simplify QA testing with secure multi-user login, easy installation, and organized test checklists.
A tool for extracting and dumping raw data from various sources quickly and efficiently.
Online tools to encode and decode various ciphers. Perfect for CTF challenges, cryptography puzzles, and learning about different encryption methods.
Encode and decode messages using the Bill Cipher, a substitution cipher from the show Gravity Falls.
Encode and decode messages using the Birds on a Wire Cipher, a substitution cipher where letters are...
Decode messages using the Chinese Code cipher, a unique scout code based on intersecting vertical an...
Encode and decode messages using the Daggers Alphabet cipher, a substitution cipher that uses dagger...
Encode and decode messages using the Dancing Men Cipher, a substitution cipher from the Sherlock Hol...
Encode and decode messages using the Enderwalk Language cipher, a mysterious alien-like script inspi...
Learn comprehensive SMTP penetration testing techniques including banner grabbing, user enumeration, and brute force attacks to identify and secure email server vulnerabilities.
NetBIOS Enumeration Cheatsheet - Comprehensive guide to NetBIOS enumeration with practical commands and techniques for hackers.
Master symbol ciphers in CTF competitions with this comprehensive guide covering Pigpen, Wingdings, Dancing Men, and other visual cryptography techniques used in cybersecurity challenges.
CTF Cryptography Cheatsheet - A practical cheatsheet, checklist, and guide for Cryptography CTF challenges.
Stay updated with the latest news in cybersecurity and technology.
Explore five exceptional React component libraries built on top of ShadCN/UI. From production-ready dashboards to beautifully animated UI sections, these open-source kits offer performance, accessibility, and design excellence for modern web apps.
Security researchers have discovered a serious vulnerability in Google Gemini for Workspace that allows attackers to inject hidden commands into emails, leading to convincing phishing attempts鈥攁ll without links or attachments.
Over 2.3 million Chrome and Edge users were compromised by 18 malicious browser extensions in the RedDirection campaign. Learn about the Trojan threat, affected extensions, and how to protect yourself.
I'm always open to discussing cybersecurity projects and opportunities.
Let's connect and make the digital world more secure!