Name: Dinesh Joshi
Alias: bitter_honey
Role: Web & Network Pentester | Aspiring Binary Exploitation Specialist
About Me#
I am Dinesh Joshi, a cybersecurity student pursuing BSc. (Hons) Ethical Hacking & Cyber Security at Softwarica College of IT & E-Commerce.
My learning and practical work focus on penetration testing, web exploitation, and network security, while actively expanding knowledge in binary exploitation and advanced offensive techniques.
Core Focus Areas:
- Web Application Penetration Testing
- Network Security & Red Team Operations
- Binary Exploitation & Exploit Development
- Capture The Flag (CTF) Challenges
Platforms & Practice:
HackTheBox, TryHackMe, GitHub – active in labs, writeups, and challenges.
Skills#
| Category | Tools & Techniques |
|---|---|
| Reconnaissance | nmap, ffuf, dirsearch, gobuster, nuclei, Nessus |
| Web Exploitation | SQL Injection (SQLi), SSTI, IDOR, Broken Access Control, SSRF, LFI |
| Web Tools | Burp Suite, ffuf, dirsearch, gobuster |
| Network Security | nmap, aircrack-ng |
| Pivoting / Tunneling | ligolo-ng, chisel |
| Programming / Scripting | Python, C, JavaScript, Bash |
Certifications & Goals#
| Certification | Status |
|---|---|
| Certified Cybersecurity Educator Professional (CCEP) | ✅ Completed |
| Certified Red Team Operations Management (CRTOM) | ✅ Completed |
| ACP (APIsec Certified Practitioner) | ✅ Completed |
| CPTS (Certified Penetration Testing Specialist) | 🎯 Planned |
Profiles#
| Platform | Handle / Link |
|---|---|
| HackTheBox | bitterhoney |
| TryHackMe | Bitterhoney |
| GitHub | bitter_honey |
| Dinesh Joshi | |
| Discord | bitter!honey |
Connect#
- Email: connectme@joshidinesh.com.np
- Discord: bitter!honey
- LinkedIn: Dinesh Joshi
“Building skills responsibly to secure systems, find vulnerabilities, and learn offensive techniques professionally.”

