TOKEN 00:30
WARNING — AUTHORISED PERSONNEL ONLY  |  ALL ACCESS ATTEMPTS ARE LOGGED  |  CASE REF:
ssh ultra@██████.onion — bash

root@kali:~# cat /etc/operative

Sahan Premarathna

handle ULTRA | clearance LVL-3
$ 

Operative specialising in offensive security & infrastructure penetration. Currently embedded at Sampath Bank as Security Intern — threat modelling, vulnerability assessment & incident response. Active on CTF circuits under handle ULTRA.

LOC ██████████████ STATUS ● ONLINE PGP ████████████
[REDACTED]
CLASSIFIED
🏦
Sampath Sec. Intern
ULTRA Active Handle
[IDENTITY PROTECTED]
Available for Deployment
ACTIVE OPERATIVE
SUBJECT // Sahan Premarathna // ULTRA CLEARANCE LVL-3

Operative with expertise in offensive security and vulnerability research. Real identity known to ███████ ████████ only. Currently embedded within Sampath Bank's Security Division, conducting threat assessments on critical financial infrastructure.

Known to operate across CTF platforms under handle ULTRA. Specialises in network infiltration, web application exploitation, and social engineering simulations. Last confirmed location: ████████████.

operative_profile.db — READ ONLY

$ SELECT * FROM operatives WHERE handle='ULTRA';

handle => ULTRA

role => Security Intern @ Sampath Bank

mission => Ethical Hacking & Penetration Testing

platforms => TryHackMe | HackTheBox | CTFtime

os => Kali Linux (primary) / Parrot OS

pgp_key => ████████████████████████

10+ CTFs Pwned
50+ THM Rooms
1+ Yr. Embedded

Offensive & Defensive Arsenal

THREAT LVL HIGH

Network Intrusion

  • Nmap / Masscan
  • Wireshark / tcpdump
  • Metasploit Framework
  • Nessus / OpenVAS
THREAT LVL HIGH

Web App Exploitation

  • Burp Suite Pro
  • OWASP Top 10
  • SQLmap / XSStrike
  • Nikto / Gobuster
THREAT LVL MED

OS & Evasion

  • Kali Linux
  • Parrot OS
  • Windows AD Attacks
  • Bash / PowerShell
THREAT LVL HIGH

OSINT & Recon

  • Maltego / theHarvester
  • Shodan / Censys
  • Recon-ng
  • OSINT Framework
THREAT LVL MED

Exploit Dev

  • Python (exploit dev)
  • Bash scripting
  • PowerShell
  • C / Assembly (basics)
THREAT LVL DEF

SIEM & Forensics

  • Splunk / ELK Stack
  • Snort / Suricata IDS
  • Log Analysis
  • Incident Response

Filed Operations

[REDACTED]
OP: SPIDER WEB
CASE-002 COMPLETE
Burp SuiteOWASPPython

Web Vulnerability Scanner

Custom Python tool automating detection of SQLi, XSS, and IDOR. Modular plugin architecture. Deployed against authorised test targets.

[REDACTED]
OP: FLAG HUNT
CASE-003 ONGOING
CTFTryHackMeHackTheBox

CTF Intelligence Archive

10+ documented CTF solutions — reverse engineering, forensics, crypto, and web exploitation. Declassified and published for community knowledge.

[REDACTED]
OP: SOCIAL GHOST
CASE-004 COMPLETE
Social EngineeringGoPhishAwareness

Phishing Simulation Campaign

Controlled phishing operation via GoPhish. Objective: measure human vulnerability in target org. Full post-op report with security hardening recommendations delivered.

Clearance & Certifications

CompTIA

Security+

In Progress
TryHackMe

Jr Penetration Tester

Verified
eLearnSecurity

eJPT

In Progress
Cisco

CCNA (Networking)

Verified
Google

Cybersecurity Certificate

Verified
Offensive Security

OSCP

Target: 2025

Establish Secure Contact

All transmissions are monitored. Use encrypted channels where possible.

Operative ULTRA accepts contact for vetted security engagements, collaboration, and authorised research. Unknown parties will be verified before any sensitive exchange.

sahan@example.com
████████████████████████
Sampath Bank — Security Division
PGP KEY: ██████████████████
SECURE MESSAGE — END-TO-END ENCRYPTED
✓ TRANSMISSION RECEIVED — Response ETA: 24–48h