Apurv Singh Gautam

Threat Researcher | Cybercrime Intel | Threat Intel | Speaker

Threat Researcher focused on monitoring and analyzing wide spectrum of sources by utilizing HUMINT, SOCMINT, and OSINT and producing finished threat intelligence.

  • 0+

    Conference Talks Delivered

  • 0+

    years of progressive cybersecurity experience

  • 0+

    citations on 2 academic research papers

About Apurv

Apurv Singh Gautam is a Security Analyst specializing in anti‑scraping investigations to protect Meta products and users from automated abuse, data exfiltration, and AI‑enabled threats. He focuses on detecting and disrupting scraping operations at scale by analyzing large datasets, building automation, and conducting investigations using OSINT, external threat intelligence, and internal telemetry to drive high‑impact enforcement actions.


Apurv has contributed to the latest SANS Institute's course FOR589 on Cybercrime Intelligence and is a contributing member of Curated Intel. He has delivered talks & workshops at national and international conferences like SANS OSINT Summit, SANS Cyber Defense Forum, DEFCON Blue Team Village, BSides Singapore, RootCon and others. Apurv is featured in major podcasts like ITSPMagazine, Tech Talks with Singh, etc. He is passionate about giving back to the community and helping others get into this field, and has delivered many talks and workshops in schools and colleges. In the past, he has volunteered with StationX to help students navigate into Cybersecurity, and also volunteered as a Darknet researcher at CTI League and EBCS Darknet Analysis group. He holds a master's degree in Information Security from Georgia Institute of Technology, USA.


He looks forward to the end of the day to play and stream one of the AAA games, Rainbow 6 Siege.

Media
Invited Talks & Podcasts (Cybersecurity)

Invited Talks & Podcasts (MS in USA)

Recorded Talks

Other Talks, Workshops, & Seminars

Experience
Education
Publications
Projects

For more projects checkout my GitHub

  • Robin is an AI-powered tool for conducting dark web OSINT investigations. It leverages LLMs to refine queries, filter search results from dark web search engines, and provide an investigation summary.

  • A curated list of OSINT Tools for the Dark Web.

  • This is a research project that uses the top 1 million list of domains from three data sources, namely Majestic, Alexa, and Tranco, to apply a set of security metrics and visualize the results of that analysis along with a summary of the change in popularity of domains for 30 days. The project also provides a tool to enumerate sub-domains efficiently, without compromising on quality results.

  • A reverse shell over HTTP (dodges deep packet inspection) by using Python 3 and no external dependencies.

To Top