My name is Sidharth S, known online as Zidhuxd. I am 17 years old, based in Kerala, India — and the founder of TeenSquad Cybersecurity. This is the story of how I got here.

// Note
This writeup documents the real origin story of TeenSquad — no embellishments, no PR polish. Just the actual timeline, the failures, and what worked.

The Beginning: A Termux Session at 14

It started with a single question: "What exactly happens when I type a URL into my browser?" I was 14. I did not have a laptop — just an Android phone and Termux installed from F-Droid. I was running nmap scans against my own home router before I even knew what a CVE was.

Within six months, I had taught myself the basics of networking, Linux, and web application fundamentals. I consumed YouTube tutorials, HackTheBox writeups, and the PortSwigger Web Security Academy — all from a phone screen.

"I did not wait for the right setup. I used what I had — an Android phone and a burning curiosity about how systems break."

Finding My First Real Bug

My first real vulnerability was a reflected XSS in a local business website. No fancy tools — I manually fuzzed input fields after reading the OWASP Testing Guide. The site's search parameter was completely unsanitized. I disclosed it to the admin via email and got a thank-you reply three days later. That reply changed everything.

I realized: this is real. Security research is not just a hobby — it is something you can actually do at 15, from Kerala, with a phone.

Building TeenSquad at 16

The idea for TeenSquad came from frustration. Every cybersecurity resource I found was either too basic or too enterprise-focused. There was nothing built for young Indian researchers who were serious about security but did not have a CS degree or a corporate budget.

TeenSquad was my answer to that gap. The name is intentional — it is a statement that teens can do serious security research. Not tutorials. Real research. Real CVEs. Real writeups.

The Initial Stack

# Tools running on a Android phone
termux-setup-storage
pkg install nmap subfinder httpx
pkg install python3 git curl wget
pip install dirsearch wafw00f
# VPS later acquired for low monthly cost
apt install amass nucleibash

Research Output: Year One

  • 4 disclosed vulnerabilities (2 SQLi, 1 IDOR, 1 stored XSS)
  • 3 detailed writeups published on this blog
  • Security flaws identified in 2 Indian SaaS platforms
  • Custom Termux OSINT toolkit used by 200+ researchers
VulnerabilityTarget TypeSeverityStatus
SQL Injection (Auth Bypass)SMM PanelCriticalDisclosed
IDOR (User Data Exposure)E-commerce PlatformHighPatched
Stored XSSForum SoftwareMediumPatched
Broken Access ControlSaaS DashboardHighDisclosed

What I Would Tell Younger Me

  • Do not wait for the right device. Termux on Android is enough to start.
  • Document everything. Every scan, every finding, every dead end. Your notes are your portfolio.
  • Disclose responsibly. Report bugs to vendors before publishing. Build a reputation for ethics.
  • Focus on one area deeply. I went deep on web app security first.
  • Build in public. This blog, TeenSquad, my GitHub — all of it compounds over time.

What is Next for TeenSquad

TeenSquad is growing. The research roadmap for 2025-2026 includes expanding into Android application security, building an open-source recon framework, and publishing a structured curriculum for young Indian security researchers. The mission has not changed: prove that age is not a barrier to serious security research.