Establishing secure connection | Loading profile data | Verifying credentials
Welcome to my interactive cybersecurity portfolio.
Type 'help' to get started.
Hello! I’m Neel Soni — a Master’s student in Cybersecurity and Threat Intelligence at the University of Guelph, passionate about digital defense, ethical hacking, and secure system design. With hands-on experience in penetration testing, security analysis, and threat intelligence, I enjoy breaking systems to build them stronger.
From reverse engineering malware to building AI-based detection models, I thrive at the intersection of offensive and defensive security. I also co-lead the OWASP WWW Chapter at University of Guelph, where I help foster a “secure by default” mindset in the next generation of security professionals.
When I’m not in a shell or IDE, I’m probably reading about zero-days, contributing to research, or solving CTF challenges.
Let’s connect — I’m always open to interesting problems, meaningful collaborations, or just talking security over coffee.
University of Guelph, Ontario, Canada
Expected Completion: Jan 2026
- Focus: Cyber defense, threat intelligence, penetration testing, and applied cryptography
- Notable Work: AI-based APT detection, malware opcode classification (arXiv:2504.13408), secure protocol analysis
Fanshawe College, London, Ontario
Completed: Dec 2024 | GPA: 3.59
- Courses included: Security Architecture, Risk Management, and Incident Response
- Capstone: Meta-synthesis on penetration testing practices for autonomous vehicles
Navrachana University, Gujarat, India
Graduated: May 2021
- Built strong fundamentals in algorithms, networks, and secure software design
- Penetration Testing, Vulnerability Assessment, Threat Intelligence
- Exploit Development, Incident Response, Security analysis, Digital Forensics
- Cryptography (AES, RSA, SHA-256), Secure Communication Protocols
- Python, Bash, Yara, PowerShell, JavaScript, HTML/CSS
- Familiar with C, SQL, and reverse engineering workflows
- Metasploit, Nmap, Wireshark, GHIDRA, Burp Suite, OpenSSL
- Nessus, OpenVAS, IDA Pro, John the Ripper, Hashcat
- Scikit-learn, TensorFlow (basic), Git, Linux (Kali, Ubuntu)
- Team Leadership (OWASP Chapter Co-Lead), Communication, Mentorship
- Problem-Solving, Attention to Detail, Rapid Learning
- AWS, Azure, Docker, Kubernetes
- Evaluated traditional ML (SVM, KNN, Decision Tree) and CNN approaches on opcode sequences
- Compared performance metrics like accuracy, precision, recall, and F1-score
- Highlighted the strength of CNNs in automated feature extraction vs. handcrafted features
Varij Saini, Rudraksh Gupta, Neel Soni
- Researched 40+ state-sponsored APT groups and their TTPs using OpenCTI.
- Researched 40+ state-sponsored APT groups and their TTPs using OpenCTI
- Extracted malware opcodes with GHIDRA and built classifiers (SVM, KNN, Decision Tree)
- Implemented a deep learning-based detection model inspired by "Deep Android Malware Detection"
- Performed full evaluation using accuracy, precision, recall, and F1-score
- Developed Python scripts to implement AES (ECB, CBC, GCM) and RSA encryption
- Explored vulnerabilities in stream ciphers and digital signature workflows using SHA-256
- Used OpenSSL to manage keys and simulate secure communication
- Built a swipe behavior-based anomaly detection system using Touchalytics dataset
- Applied binary vs. multi-class classification with feature engineering and scikit-learn
- Evaluated effectiveness as a secondary authentication method
- Created buffer overflow exploits in C-based apps to escalate privileges
- Deployed OpenVAS, Nessus, and custom Nmap scripts for scanning/fuzzing
- Performed automated exploitation using Metasploit and verified post-exploitation impact
- Executed practical attacks including SQL Injection, CSRF, and XSS
- Demonstrated session hijacking, request forgery, and database manipulation
- Provided mitigation techniques and attack traces via terminal & browser logs
I'm always open to interesting opportunities, collaborations, or just a good conversation about cybersecurity.
Guelph, Ontario, Canada | Open to Remote Opportunities
Feel free to drop a message — I usually respond faster than your IDS detects port scans.
Download my comprehensive resume to review my qualifications, publication, and experience: