SUBJECT·FILE
Mukul Joshi
HANDLE: CYB3RFY·STATUS: ACTIVE·LOCATION: PUNE, IN
Pentests web applications; competes in CTFs; teaches the rest on YouTube.
- AFFILIATION
- Army Institute of Technology, Pune (CSE, '27)
- DISCIPLINES
- Web Exploitation · Forensics · Reverse Engineering · IoT Security
- LANGUAGES
- Python, JavaScript, C/C++, Bash, SQL
- TOOLBELT
- Burp Suite, Nmap, Metasploit, Wireshark, SQLmap, Ghidra
DOSSIER NOTES
Subject presently serves as Cybersecurity Research Intern at Fenrir Security (February through May 2026), assigned to web application penetration testing, AI-driven custom skill development, automated reconnaissance pipelines, and [REDACTED — under NDA]. A prior engagement at CopperCloud IOTech (April through July 2025) covered IoT hardware security and Industry 4.0 audit work.
Subject operates the CYB3RFY channel on YouTube — 90+ instructional videos on web exploitation and capture-the-flag methodology, current following 360 subscribers. At Army Institute of Technology, Pune, subject holds the post of Secretary, ISDF cybersecurity club, and directed the Bypass CTF (542 registered teams).
INTERCEPTS·LATEST BROADCASTS — @CYB3RFY

TryHackMe Love at First Breach: FULL Walkthrough (All 10 Tickets)
2026-02-16 · 478 views
TryHackMe: Anonymous Playground | Buffer Overflow & Tar Wildcard Injection
2026-02-15 · 64 views
Infosec University Hackathon: How I Defeated Vecna & Rooted the Upside Down
2025-12-22 · 307 views
Reverse Engineering for CTF Beginners — The Step-By-Step Guide I Wish I Had When I Started
2025-12-03 · 631 views