BE Cybersecurity graduate currently interning at CyArt, building CyTrack — a multi-agent autonomous web pentesting platform running in production. I research how web applications break, build tools that automate that process, and document everything I learn.
I'm Sree Danush S — an offensive security engineer, tool builder, and founder of Project-Hellhound, an open-source security research organisation building autonomous offensive tools at the intersection of web security, AI, and automation. BE Cybersecurity graduate from Mahendra Engineering College.
At CyArt, I contribute to CyTrack — a multi-agent autonomous web pentesting platform. Multiple agent layers, each targeting a different attack class, run in production against real targets. This is production-grade offensive security engineering, not a side project.
In parallel, I maintain Hellhound — my personal modular pentest framework — and consistently practise through PortSwigger Web Security Academy, where I'm currently exploring areas like Web LLM attacks, advanced injection techniques, and newer web attack vectors. I believe the best security engineers never stop practising their craft.
High-fidelity autonomous command injection detector built for modern web targets. Pairs a SPA-aware crawler with a 5-tier injection engine — direct output, time-blind, redirect, OOB, and adaptive WAF bypass. Every finding verified and delivered with a ready-to-run PoC. Zero false positives.
Autonomous XSS hunter — maps attack surfaces, analyzes character survivability, and validates vulnerabilities through headless browser automation. Handles Reflected, Stored, DOM-based, mXSS, uXSS, and Blind XSS vectors with a confidence scorer and visual evidence capture.
Modular rule-based web application security testing framework built around a multi-agent architecture. Designed to automate vulnerability discovery by dividing the testing workflow into specialised agents — each responsible for detecting a specific class of security issues. Internal project — no public repo.
Async web crawler for security testing — maps endpoints, parameters, and security issues across traditional and SPA web applications. Standalone CLI tool with headless browser support.
Modular web penetration testing framework focused on structured intelligence correlation and guided exploitation workflows. Features a hybrid console architecture, SPA-aware reconnaissance modules, parameter intelligence analysis, and a rule-based suggestion engine that identifies logical attack paths while maintaining full operator control.
AI-assisted OSINT investigator with a terminal-style interface. Integrates sherlock, maigret, whois, nmap, and crt.sh under a single case-based workflow powered by Gemini 2.5 Flash — correlating entities, breaches, and pivots into structured intelligence sessions.
I'm open to offensive security roles, research internships, and collaborations on security tooling.
Recruiter, researcher, or fellow hacker — reach out. I respond fast.
Preferred: Email · GitHub · LinkedIn