Hi There,
I'm Pancham Narang

i am into

About Me

About Me

I'm Pancham Narang

CyberSecurity Researcher

I’m Pancham Narang also known as ExploitReaper, a passionate and skilled cybersecurity researcher and reverse engineer with hands-on experience in malware analysis, Android application security, and vulnerability research. I specialize in dissecting real-world malware, performing in-depth reverse engineering, and uncovering security flaws in web and mobile applications. My core strengths include OSINT, HUMINT, penetration testing, and threat intelligence. I also lead my own research initiative focused on custom malware analysis pipelines and real-time exploit discovery. Actively engaged in platforms like Bugcrowd and HackerOne, I continually strive to expand my knowledge, sharpen my skills, and contribute meaningfully to the cybersecurity ecosystem.

email : flickerhackingfirm@gmail.com

place : Delhi, India

Skills & Abilities

My Services

Advanced Reverse Engineering

Expert reverse engineering of software, malware, and firmware to understand internal mechanisms and security implications.

Malware Development & Analysis

Custom malware development for red team operations and comprehensive analysis of advanced malware strains.

Penetration Testing

Comprehensive security assessment of Web, Network, API, and Mobile applications to identify and exploit vulnerabilities.

Vulnerability Assessment

Systematic evaluation of security weaknesses in systems and applications with detailed remediation guidance.

Incident Response & Digital Forensics

Expert handling of security incidents and detailed digital forensics investigation for threat analysis.

Red Team & Social Engineering

Advanced adversary simulation and social engineering assessments to test organizational security posture.

Threat Hunting & Malware Analysis

Proactive threat hunting and in-depth analysis of malicious software to understand attack patterns.

Cloud Security Testing

Comprehensive security assessment of AWS, Azure, and GCP environments to ensure cloud infrastructure safety.

SOC Setup & Support

End-to-end setup and management of Security Operations Center for continuous security monitoring.

Source Code Review

Detailed security analysis of application source code and implementation of security hardening measures.

Network Security Assessment

In-depth evaluation of network infrastructure and security controls to identify vulnerabilities.

Active Directory Security

Comprehensive hardening of Active Directory infrastructure against modern attack techniques.

Security Policy Development

Creation and review of security policies, procedures, and architecture aligned with business needs.

Compliance Readiness

Preparation and assessment for ISO 27001, GDPR, PCI-DSS, and other security compliance requirements.

Zero Trust Security

Implementation of Zero Trust architecture and security controls across organization infrastructure.

DevSecOps Integration

Integration of security practices into DevOps pipelines for secure software development lifecycle.

Mobile & IoT Security

Specialized security testing of mobile applications and IoT devices for vulnerability assessment.

Threat Intelligence

Advanced cyber threat intelligence gathering and dark web monitoring for proactive security.

vCISO Services

Virtual Chief Information Security Officer services for strategic security guidance and leadership.

Security Training

Comprehensive security awareness, phishing simulation, and corporate training programs.

Experience

Co-Founder & CTO

Jun 2025 - Present

Freelancer

CyberSecurity Consultant

Feb 2023 - Jun 2025

Bug Hunter

Freelance BugHunter(AndroidPentesting, WebPentesting, IOSPentesting)

Dec 2023 - Present

Flicker Hacking Firm

Co-Founder & CEO

April 2024 - Jan 2025

Defronix CyberSecurity

DCCI Intern

May 2025 - Jun 2025

Get in Touch