> Establishing secure connection...
> Connecting to secure server...
> Authenticating credentials...
> Connected securely.
> Loading secure environment...
CONTACT-TRAGO
I WALK ALONE IN THE NETWORK'S SHADOWS - MADE BY TRAGO
I WALK ALONE IN THE NETWORK'S SHADOWS - MADE BY TRAGO

JAYAKEERTHICK R

Cybersecurity Student|Security Researcher|CTF Enthusiast

Monitoring. Detecting. Defending. Turning Threat Intelligence into Action with a Passion for Cybersecurity.

root@trago:~$ whoami
> Final Year Cybersecurity Student|Security Learner|CTF Enthusiast
root@trago:~$ project --current
> 🧠 DNS Spoofing Detection using AI
> 🎣 Hosting Phishing Sites Detection
> 🔐 IoMT Authentication System
root@trago:~$ status
> Evolving daily. Building expertise across cybersecurity, research, and emerging technologies.🔥
$ Initializing security protocols...
TRAGO - Cybersecurity Expert
JAYAKEERTHICK R -[TRAGO]
JAYAKEERTHICK R -[TRAGO]