Summary
Overview
Education
Skills
Projects
Certification
Languages
Timeline
Generic

Dev Arora

Alwar

Summary

Aspiring software developer and second-year BCA student with a passion for coding and real-world applications. Completed projects like a key-logger and voice search tool, reflecting strong analytical and programming abilities. Seeking internship opportunities to gain industry experience and collaborate with seasoned professionals. Ready to tackle challenges and contribute effectively to team objectives.

Overview

1
1
Certification

Education

Bachelor of Computer Applications - Cyber Security

Poornima University
Jaipur, India
05-2026

CBSE - Commerce With Informatics Practices

Alwar Public School
Alwar
03-2023

Skills

  • Python
  • Linux
  • HTML/CSS
  • MySQL
  • Java
  • Computer Networking
  • Cybersecurity
  • Networking
  • GitHub
  • Teamwork & Collaboration
  • Problem Solving
  • Critical thinking
  • Adobe Photoshop

Projects

Local Server Deployment Tool

  • Developed a tool using Python to deploy websites and web applications on a local server for testing and debugging purposes.
  • Enables developers to simulate production environments and work offline without needing an internet connection.
  • Provides flexibility in testing multiple projects locally without relying on third-party services.


Voice Search Assistant

  • Built a Python application that utilizes voice recognition to convert spoken words into text and search Google accordingly.
  • Integrated Python libraries such as SpeechRecognition and pyttsx3 for speech-to-text conversion and text-to-speech output.
  • Focused on automating user queries and improving accessibility by allowing hands-free interactions.


Custom Encryption & Decryption Program

  • Designed a unique, custom encryption algorithm that ensures the security of text data by encoding it in a non-standard way.
  • The encryption method is difficult to decipher without access to the original algorithm, providing high levels of data security.
  • Aimed at learning cryptographic techniques and understanding the importance of data protection and secure communication.


RAM Optimization Tool for Windows

  • Developed a Windows-specific tool that detects and terminates unnecessary background processes consuming RAM, improving system performance.
  • Uses Python's psutil library to monitor system tasks and free up memory, preventing system slowdowns.
  • Useful for improving the overall health of a Windows PC by reducing memory overload and optimizing resource usage.


Keylogger (For Ethical Research Purposes)

  • Created a keylogging tool in Python to track and log keystrokes on a system, demonstrating how malicious software can capture sensitive information.
  • Designed purely for ethical research, aimed at studying the impact of keyloggers and how they affect system security.
  • Provides valuable insight into the importance of cybersecurity measures to protect personal information and maintain privacy.


AI Chatbot with Multi-Functionality

  • Developed a chatbot capable of performing simple conversations, retrieving news, conducting Google searches, and telling jokes, using Python.
  • Utilized NLTK and Google API for integrating natural language processing and web search capabilities.
  • Focused on creating an interactive and user-friendly tool, enhancing the user experience with humor and useful information.


Automated Web Typer Tool

  • Created an automation script that bypasses website restrictions such as copy-paste blocking by simulating keystrokes in web forms.
  • Aimed at automating repetitive tasks and overcoming copy-paste limitations in certain web environments.
  • Uses Python's pyautogui library for simulating keyboard input, enhancing productivity and providing a useful tool for developers.


Simulated Malware (Security Testing Tool)

  • Engineered a mock malware program designed for educational purposes to simulate harmful system behaviors like RAM/CPU overload and self-replication.
  • Features include disabling task manager, auto-restarting, and persistent replication, mimicking real-world malware behavior.
  • Created to help understand system vulnerabilities and security flaws, offering an opportunity to study the impact of malware on a PC's performance.

Certification

  • Real Ethical Hacking in 43 Hours: Certificated CSEH+CEH PRO by Udemy
  • Introduction to Critical Infrastructure Protection (ICIP) by OPSWAT
  • Pre Security Learning Path by TryHackMe
  • Google Analytics Academy by Google Digital Academy
  • Introduction to Cyber Security by TryHackMe
  • Python Essential Training by LinkedIn
  • Python (Basic) Certificate by HackerRank
  • SQL (Advanced) by HackerRank
  • SQL (Intermediate) by HackerRank
  • SQL (Basic) by HackerRank
  • C# (Basic) by HackerRank
  • Java (Basic) by HackerRank


Languages

English
Hindi

Timeline

Bachelor of Computer Applications - Cyber Security

Poornima University

CBSE - Commerce With Informatics Practices

Alwar Public School
Dev Arora