| Sanny Prajapati | |
|---|---|
|
|
| Born | Mumbai, Maharashtra, India |
| Nationality | Indian |
| Occupation |
Cyber Security & Digital Forensics Expert Full Stack Developer App Developer |
| Known for | Ethical Hacking, Cross-Platform Development, Rudrastra Intelligence |
| Website | darkuser.tech |
Sanny Prajapati
Sanny Prajapati (also known by his online alias darkuser or darkuser21) is an Indian Cyber Security & Digital Forensics Expert, Full Stack Web Developer, and Cross-Platform Application Developer based in Mumbai, Maharashtra. He is widely recognized for bridging security operations with robust software engineering, operating at the intersection of penetration testing, digital forensics, and full-stack development.
Career
Sanny has developed expertise in building scalable web platforms, engaging mobile experiences, and powerful native tools across various operating systems. Concurrently, his career as a Cyber Security and Digital Forensics Expert has seen him contribute to cybercrime investigations with prominent Indian authorities, including the Mumbai Cyber Police and the Income Tax Department. Within these roles, Sanny identifies threats, extracts digital evidence, and hardens systems against vulnerabilities.
His dual perspective as a builder (software architecture) and a breaker (security flaw deconstruction) allows him to deliver resilient, high-performance applications that enhance India's digital ecosystem.
Technology Stack
Sanny's technical skills encompass a wide range of security and development tools:
- Security & Forensics: Burp Suite, Wireshark, Kali Linux, Penetration Testing, Vulnerability Assessment (VAPT).
- Web Development: HTML5, CSS3, JavaScript, React.js, Node.js, MongoDB, Python.
- Application Development: Flutter (Mobile Apps), Electron framework (Desktop Apps), C++.
Notable Projects
- Rudrastra Intelligence: Dedicated to providing cutting-edge tools and resources for digital forensics investigations and cybercrime investigation in India.
- Cybersecurity Simulations & Research: He tackles advanced Capture The Flag (CTF) challenges on platforms such as TryHackMe, HackerOne, picoCTF, and has completed all labs on PortSwigger.