Open to internships & learning opportunities

Sanskar Bhattarai

Information Technology Student & Aspiring Researcher

Bachelor in Information Technology, actively learning cybersecurity through hands-on labs, CTF challenges, and personal projects.

whoami

universityTribhuvan University — Bachelor in Information Technology (3rd Year)

focusCybersecurity Research & Dev

statusactively learning

Sanskar Bhattarai
01 / about

Who I Am

A computer science student building serious cybersecurity foundations: one lab, one writeup, and one project at a time.

I'm a third-year Computer Science student with a growing focus on cybersecurity. I started with the basics : networking, Linux, Python; and have been progressively working into more security-specific areas like web exploitation, log analysis, and cryptography fundamentals.

My approach is practice-first: I spend more time in labs and CTF platforms than I do reading textbooks. Every challenge, every broken script, and every misconfigured VM teaches me something a lecture wouldn't.

Currently exploring cybersecurity topics like web application security, basic malware analysis, and learning how privilege escalation works in controlled lab environments. Interested in understanding how systems can be secured and tested ethically.

profile.json

name:"Sanskar Bhattarai"
degree:"Bachelor in Information Technology"
year:"3rd Year"
location:"Nepal"
focus:"Cybersecurity"
learning:"Always"

Security Fundamentals

Networking protocols, web vulnerabilities, authentication flaws, and the OWASP Top 10, building a solid theoretical and practical base.

Programming & Tools

Writing security-oriented scripts in Python, learning C for low-level understanding, and getting familiar with standard security tooling.

Hands-On Learning

CTF challenges, TryHackMe rooms, HackTheBox machines, and personal lab environments. Learning by doing, not just reading.

Documentation & Research

Writing up everything I learn, from challenge walkthroughs to vulnerability analyses. Building a knowledge base for the long term.

02 / skills

Skills & Technologies

An honest assessment of where I am. Skill levels reflect actual practice, not wishful thinking.

ComfortableFamiliarLearning— self-assessed proficiency

Programming

  • PythonComfortable
  • CFamiliar
  • JavaScriptFamiliar
  • C++Familiar
  • PHPFamiliar

Networking

  • TCP/IP FundamentalsComfortable
  • DNS & HTTPComfortable
  • WiresharkFamiliar
  • NmapFamiliar
  • VPN & ProxiesFamiliar

Linux & Systems

  • Linux CLIComfortable
  • File PermissionsComfortable
  • Bash ScriptingLearning
  • Process AnalysisLearning
  • Kernel BasicsLearning

Web Security

  • OWASP Top 10Familiar
  • Burp SuiteLearning
  • HTTP AnalysisComfortable

Tools & Platforms

  • Git & GitHubComfortable
  • Docker (basics)Learning
  • TryHackMeLearning
  • HackTheBoxLearning
  • PycharmComfortable

Concepts

  • Cryptography BasicsFamiliar
  • Reverse EngineeringLearning
  • Malware AnalysisLearning
03 / projects

Projects & Experiments

Tools I've built and experiments I've run. Each one is a learning artifact.

Port_Scanner

Complete

A simple and efficient multi-threaded port scanner built in Python to quickly scan a range of ports on a target IP address.

PythonSocketsThreadingMySql
Source Code
#networking#tool#python

Python File Encryptor and Decryptor

Complete

A simple Python tool for encrypting and decrypting files using AES-128 symmetric encryption with the Fernet scheme.

PythonCryptographyFernet
Source Code
#encryption#python#security

PDF Merger and Splitter

Complete

A Python desktop application for merging, splitting, and extracting pages from PDF files through a simple GUI.

PythonTkinterPillow
Source Code
#pdf#desktop-app#python

— other projects

Password Strength Checker and Generator

Complete

A simple desktop application built with Python and Tkinter to evaluate password strength and generate secure passwords.

PythonTkinter
Source Code
#password#security#gui

Tic Tac Toe

Complete

A browser-based Tic Tac Toe game featuring an unbeatable AI opponent using the minimax algorithm and a local 2-player mode.

JavaScriptHTML5CSS3
Source Code
#game#ai#javascript
04 / latest

Latest Writing

CybersecurityNepalPolicyCTFBug Bounty

The Talent Abroad, the Vulnerable Home: Nepal's Cybersecurity Paradox

Nepal produces world-class ethical hackers yet suffers repeated digital infrastructure failures. This paper diagnoses the disconnect: economic incentives that attract talent abroad, an outdated legal framework, and a system that discourages domestic vulnerability reporting. It proposes policy interventions including a national vulnerability disclosure policy, a domestic bug bounty platform, and an operational CERT.

May 17, 202612 min read
05 / contact

Get In Touch

I'm always open to learning opportunities, internship leads, project feedback, or just talking about cybersecurity.

Note:I am a student and respond best to thoughtful, specific messages. If you're reaching out about a project, opportunity, or to share knowledge. I'd love to hear from you.