About Us

About Us - TechWithAmardeep

About TechWithAmardeep

Hi, I'm Amardeep Maroli — an MCA student passionate about API security, bug bounty hunting, and a cybersecurity enthusiast and self-taught developer who has spent the last few years deep-diving into API security, ethical hacking, and Python-based security testing.

I started this blog because when I was learning, I struggled to find resources that were both beginner-friendly and technically honest. Most tutorials either oversimplified everything or dumped jargon without any real explanation. I wanted to change that.

This blog is my attempt to share everything I've learned — the mistakes, the breakthroughs, and the practical knowledge that actually helps you build secure systems or land a cybersecurity career.

My Work & Profiles

  • GitHub: GitHub Profile
  • I actively build API security tools, Python automation scripts, and work on real-world vulnerability research.

What You'll Find Here

This blog covers three main areas:

  • API Security — How APIs get exploited, how to test them properly, and how to build them securely. Real examples, not just theory.
  • Ethical Hacking & Penetration Testing — Beginner-to-advanced guides, tools like Burp Suite and OWASP ZAP, and practical labs you can try on platforms like TryHackMe and PortSwigger Academy.
  • Python for Security — Automating security tests, writing your own scanners, and understanding how attackers write tools so you can defend against them.

Who This Blog Is For

Whether you're a complete beginner who just heard the word "cybersecurity" for the first time, or a developer who wants to understand security from the inside — this blog is written for you. I try to keep things conversational, skip the unnecessary jargon, and always explain the "why" behind every concept.

Why Trust This Blog?

  • All content is based on hands-on learning and real tools like Burp Suite, Postman, and OWASP ZAP.
  • No copied or AI-spun content — everything is written from practical experience.
  • Focused on real-world application, not just theory.

A Little More About Me

Outside of security, I enjoy reading about system design, tinkering with small Python projects, and occasionally losing hours on CTF (Capture the Flag) challenges. I'm based in India, and I write from personal experience — not press releases.

While I am still early in my professional journey, every concept shared here is based on hands-on learning, real-world tools, and continuous experimentation in cybersecurity.

Disclaimer on Hacking Content

Everything on this blog is for educational purposes only. All hacking techniques and security testing methods are discussed in the context of ethical, authorized testing. I do not encourage or condone illegal activity of any kind. Always get written permission before testing any system you do not own.

Have a question, suggestion, or just want to say hello? Head over to the Contact Us page — I personally read and respond to every message.

Comments

Popular posts from this blog

SQL Injection Explained: 5 Types, Real Examples & How to Prevent It (2026 Guide)

Penetration Testing Guide: Real-World Methodology (Recon to Exploitation) [2026]

Phishing Scams in 2026: How They Work & How to Avoid Them