Skip to main content
Abhilash Nigam character illustration
Hello, I'm

Abhilash Nigam

A Cyber-Security Consultant

I specialize in web and mobile application security assessments, red teaming, and purple teaming evaluations.

With 6+ years of experience and OSCP/CRTP certifications, my current role involves ensuring the security of computer systems. Explore my portfolio to discover more about my journey in cybersecurity.

Contact me!

Who am I?

Abhilash Nigam profile picture

Hello, I'm Abhilash, a cybersecurity professional with 6+ years of experience, holding OSCP and CRTP certifications. My journey includes roles as a software security evaluator and hardware security specialist, fortifying systems against vulnerabilities.

Here is my educational background.

Bachelor of Engineering in Information Science

Dayananda Sagar Academy of Technology and Management | 2012 ~ 2016
  • Studied information science, software development
  • Graduated with Second Class Honours

Higher Secondary in Science Stream

The Aryan School | 2010 ~ 2012
  • Reached quater-finals in Inter-State Badminton Championship, Uttrakhand.
  • Runner-Up in District level Badminton Championship, Dehradun.

Senior Secondary in Science Stream

The Aryan School | 2018 ~ 2010
  • Won multiple public speaking inter-school competition in Hindi, English and Punjabi.
  • State topper in computers in Olympiad conducted by University of New South Wales - Australia.

Featured Projects

“Talk is cheap. Show me the code”? I got you.
Here are some of my projects you shouldn't misss
iDrill

iDrill

iDrill is a robust iOS pentesting tool employing static code analysis, meticulously examining aspects like architecture, binary encryption, stack smashing protection, and more. Leveraging the power of otool from Darwin CC Cydia Repository, it offers comprehensive insights and welcomes user input for feature enhancements via the developer's social media handle.

  • iOS
  • Mobile-Pentesting
  • iOS-Pentesting
Other projects can be explored in my github profile

Blog

I write blog posts about what I've done and what I'm doing as a documenting practice. Here are some of my recent blog posts.
  • Posted on:  at 

    So in my last blog I showed you guys to set up the iOS devices to start your journey in testing iOS Applications. I have also written a simple script that will automatically do the job of installing basic packages on your iPhone and help you start your journey in testing iOS Applications, you can find it on my [Github](https://github.com/abhilashnigam/iOS-Phone-Setup). If you have not read my previous blog then you can read it on [ios-pentesing-guide-from-a-n00bs-perspective.1](https://abhilashnigam.nl/blog/posts/ios-pentesting).

  • Posted on:  at 

    Hello Guys, There are tons of blogs and resources available over the internet for helping you start your journey with Android Security Assessment but only a handful of resources will explain in detail how to start with iOS Security Assessment. This blog aims at helping you start iOS Security Assessment.

  • Posted on:  at 

    It’s been a while since I wrote a blog. This blog is to describe my journey of Pentester Academy's Certified Red Team Professional (CRTP) course. Few months back Offensive Security updated their PWK course. When I was going through the updated course content, I honestly felt that I made a mistake opting for PWK in 2019 and that I should have done it in 2020. The major changes in course material was the addition of Active Directory and PowerShell Empire modules. I wanted to gain better understanding of the Active Directory security so I took the course.

  • Posted on:  at 

    This post is part 1 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

Contact

Let's be awesome together!

As a dev, I am driven by my love for coding and my desire for new challenges. If you have opportunities for collaboration or want to build something amazing, don't hesitate to contact me!

Get in touch!