Co-Founder & Chief Technology Officer
BugBase · Delhi, India
co-founder & chief technology officer @ BugBase![]()
I've tried and failed at many things but succeeded at a few that truly stuck with me. In fact, I succeeded because I stuck with those.
I'm Aditya Peela, co-founder and CTO at BugBase. Currently, I'm developing a tool called Pentest Copilot, which aims to replace a security red team in companies. Learn more here.
In 2021, I dropped out of my undergraduate program at Manipal to focus on building software.
Developing software and solving problems with it has always been what I love. I excel at solving software problems as well.
BugBase · Delhi, India
Krypto Cards LLP · Manipal, Karnataka, India
ZAAMO · Remote
IECSE · Manipal, Karnataka, India
Manipal Institute of Technology
AI-native autonomous red teaming platform that maps attack surfaces, simulates realistic kill-chain behavior, and automates validation and reporting across web, API, and internal environments.
A Continuous Vulnerability Assessment and Management Platform to identify, manage and mitigate real security vulnerabilities by plugging into Bug Bounty and Pentesting programs
Watch AI agents with real personalities pick choices in a simulated world and explain their choices. It's conjoint analysis that feels like SimCity—no surveys, no waiting, just instant insight into what drives customer decisions.
Diffcast uses AI to watch your code changes and generate a perfect demo video the moment you merge. No more screen recording, no more explaining features—just instant, visual updates for your entire team.
Authify is a Role-Based Access Control (RBAC) platform designed to streamline the process of building and managing permissions. A Simple dashboard to manage users, roles and permissions.
Squad brings Google Drive-like access control to Web3, replacing 'public-by-default' IPFS storage with a novel AES-RSA encryption scheme. Now DAOs can securely manage sensitive files within specific teams, ensuring only authorized members hold the decryption keys.
Read my research papers and blog posts.
Research Paper
Hacking, The Lazy Way: LLM Augmented Pentesting
An agentic AI system for autonomous penetration testing using LLMs.
Blog Post
How to Implement Role-Based Access Control
A practical guide to designing and enforcing RBAC in modern applications.
Blog Post
Understanding Single Sign-On (SSO)
Breaking down SSO protocols, flows, and implementation strategies.
Always open to new ideas and conversations, new connections and collaborations. Reach out anytime!