
Basic Strong Password Generator (2025)
A simple Python script to generate a strong random password of desired length using uppercase letters, lowercase letters, digits, and special characters.
I am SAYANI MAITY, currently pursuing B.Sc. in Digital Forensics (2023–2026). I specialize in digital forensics, penetration testing, OSINT, and security tooling. I create detailed case reports, analyze digital artifacts, and reconstruct system events to uncover evidence. I actively participate in Capture The Flag (CTF) challenges, hands-on security research, and explore AI-assisted detection tools, automation, and threat analysis techniques.
My skill set includes Python, Bash, shell scripting, VAPT, WAPT, threat management, Nmap, Burp Suite, Autopsy, networking, OSINT research. I am deeply passionate about learning, sharing knowledge, and applying my expertise to practical cybersecurity projects that strengthen digital systems and uncover vulnerabilities.
I am curious, analytical, and highly detail-oriented, which drives me to explore complex digital problems and uncover practical solutions. Beyond academics, I am passionate about ethical hacking, experimenting with new tools, and contributing to cybersecurity communities. I strongly believe in continuous learning and mentorship, often collaborating on projects and sharing insights with peers. My goal is to merge technical expertise with creativity, applying my knowledge to real-world scenarios to strengthen digital systems, uncover vulnerabilities ethically, and make meaningful contributions to the field of cybersecurity.
As a passionate Digital Forensic student, my goal is to deepen my knowledge of cybersecurity, digital investigations, and ethical hacking. I strive to develop practical skills that help uncover digital evidence, secure systems, and solve complex security challenges. I am committed to continuous learning, hands-on research, and exploring innovative solutions in cybersecurity, coding, and AI-assisted detection. Ultimately, I aim to become a proficient professional who bridges the gap between theory and real-world application, contributing meaningfully to the digital security landscape.
A simple Python script to generate a strong random password of desired length using uppercase letters, lowercase letters, digits, and special characters.
The Caesar Cipher is one of the oldest known encryption techniques. It works by shifting each letter of the plaintext by a fixed number of positions in the alphabet. This tool enhances it by adding auto-decryption and brute-force cracking for educational and security learning purposes.
Cyber Security Multi-Tool Launcher is a unified GUI-based platform that integrates powerful network scanning, vulnerability assessment, penetration testing, and forensic tools into a single tool. Instead of manually running multiple tools, users can launch and manage them through one centralized interface with "Just a Click".
NLP + header analysis to detect phishing emails (in development). Seeking contributions.
My research focuses on forensic artifact analysis, timeline reconstruction, and applied security automation. I actively explore AI-driven phishing detection, privacy-preserving forensic analysis, and the development of open-source forensic tools and case studies. Additionally, I investigate methods to enhance digital evidence acquisition and analysis using advanced machine learning techniques, aiming to improve accuracy and reduce investigation time. My work also encompasses cloud forensics, IoT security, mobile device investigations, and emerging threat analysis, allowing me to understand vulnerabilities across diverse digital platforms. I collaborate with peers and cybersecurity communities to validate findings, participate in real-world case studies, and refine best practices, ensuring that my research is both practical and impactful.
My ultimate goal is to contribute meaningfully to the cybersecurity and digital forensics community by improving investigative efficiency, bridging the gap between academic knowledge and real-world application, publishing insights, developing practical tools, and sharing guidance that empowers others in the field. Through my research and continuous learning, I strive to grow as a proficient professional capable of addressing complex security challenges and fostering safer digital environments. I am committed to combining technical expertise with creativity and practical application to make a lasting impact in the world of cybersecurity.