I'm Niraj Adhikari an offensive security researcher, cybersecurity trainer, and software architect. I break systems to understand how to defend them, teach others how to build security into everything they do, and architect scalable solutions across cloud and on-premise environments.
I actively publish on my blog covering ethical hacking, networking, Linux, system design, and cybersecurity roadmaps. I hold verified certifications on Credly and train others on platforms like TryHackMe.
- Architecting a production-grade distributed system handling load balancing, horizontal scaling, fault tolerance, and zero-downtime deployments
- Engineering a custom AI system on top of OpenRouter API building LLM routing logic, managing model fallbacks, and shipping it as a production-ready AI pipeline
| Area | Focus |
|---|---|
| π΄ Offensive Security | Penetration testing, red teaming, bug bounty hunting, CTF β Security Visual Animation β | Session System β | API Service β |
| π‘οΈ Cybersecurity Trainer | Teaching ethical hacking, Linux security, networking & labs β See Student Work β |
| ποΈ Software Architect | System design, scalable architecture, API design patterns β See Open Source Project β |
| π Networking | Network architecture, protocols, practical labs, troubleshooting β See Open Source Project β |
| π£ Reverse Engineering | Binary analysis, malware analysis, debugging, View Resources β |
| π€ AI / ML & LLM Engineering | AI Agents, LLMs, RAG, Predictive ML, CV, NLP β See Open Source Project β |
| π§ Linux | Linux administration, hardening, scripting, security |
| βοΈ Cloud Engineering | Multi-cloud infrastructure: AWS Β· GCP Β· Azure Β· Linode Β· Heroku |
π΄ Offensive Security
π Networking
π§ Linux
βοΈ Cloud
ποΈ System Design & Architecture
π» Software & Development
π Bug-Bounty-ToolsYour Comprehensive Collection of Bug Bounty Tools for Effective Cybersecurity Testing |
π§ advtoolsAdvanced security tools collection for offensive security operations and automation |
βοΈ fuzzy-engineSystem Design Master Guide β a structured production-focused resource for learning how large scale systems are designed, built and optimized |
π network-practicalHands-on network architecture, protocols, and practical labs for real-world troubleshooting and security |
Cybersecurity Blog β hackthacker.blogspot.com
- π Using Kali Linux β Access and Compromise any system
- πΊοΈ Cybersecurity Roadmap β Beginner to Professional Career
- π·οΈ Ethical Hacking Β· Networking Β· Blockchain
"Everyone should read the Bhagavad Gita at least once in their life π β Hare Krishna β€οΈ"
Made with β€οΈ by hackthacker




