Pratyaksha Beri / Shad0wMazt3r
Cyber Security Engineering at Iowa State University, with work across agentic security, malware analysis, DFIR, CTFs, and practical security tooling.
Focus
Application Security, Reverse Engineering, Offensive Security
Active in
CTFs, Cyber Defense Competitions, Research
Tools
Python, C, PHP, Java, Bash, Linux
May 1, 2026
LLMs have gotten surprisingly good at finding vulnerabilities over the past year. These are my notes on building better AI-assisted security workflows, and how different models are impacted by scanners and skills differently.
Read article
August 11, 2024
In this project, we performed a comprehensive security analysis on a Linux machine. The objective was to identify, analyze, and provide recommendations to mitigate various vulnerabilities found on the target system.
Read article
August 5, 2024
Explore the discovery and analysis of VajraSpy, an Android malware by the Indian APT "Patchwork," designed to exfiltrate data from messaging apps. This blog details my experience with malware analysis and the technical findings from the investigation
Read article
Selected work
Projects and research threads
AI toolkits / vulnerability research
The Scaffolding
AI-assisted bug-hunting workspace for tracing behavior, building clean proof-of-concept cases, and documenting findings.
AI toolkits / security analysis
Lattice Mind
Research and tooling around structured investigation workflows, reasoning artifacts, and turning security context into usable analysis.
Security tooling / honeypots
HoneyEasy
Honeypot-oriented security tooling focused on making collection, observation, and lab deployment easier to work with.
Python / Embedded systems
CyTTY
UART terminal tooling for Iowa State CyBot work, with voice input, text fallback, configurable UART settings, and activity logging.
Python / PHP / TypeScript
Scammer-List
Spam and scam detection project using profile names, website signals, message analysis, and a maintained scammer dataset.
DFIR / Linux / remediation
Analyzing a Compromised Linux Machine
Security assessment writeup covering vulnerabilities, proof-of-concept evidence, impact, and remediation guidance.