Skip to content
View RUTHRAN-SEC's full-sized avatar
♾️
♾️

Block or report RUTHRAN-SEC

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RUTHRAN-SEC/README.md

RUTHRAN

views

Focused on hands on cybersecurity investigations, blue team operations, digital forensics, web application security testing, and offensive security labs. Experienced in investigating real world attack scenarios, log analysis, endpoint investigations, phishing analysis, network forensics, SIEM engineering, and web exploitation techniques.


About Me

I am a cybersecurity enthusiast focused on Security Operations Center (SOC) investigations, Digital Forensics & Incident Response (DFIR), threat hunting, and web application security.

My work is heavily hands on and investigation driven. I continuously build practical labs, detection engineering projects, SIEM environments, penetration testing labs, and real world incident investigations to strengthen my blue team and offensive security skills.

I actively document:

  • Security investigations
  • Incident response workflows
  • Threat hunting methodologies
  • Malware behavior analysis
  • Network traffic investigations
  • Web application vulnerabilities
  • Detection engineering
  • API security testing
  • Capture The Flag (CTF) writeups

Core Skills

Blue Team

  • Security Monitoring
  • Threat Hunting
  • SIEM Analysis
  • Log Correlation
  • Incident Response
  • Digital Forensics
  • Malware Investigation
  • IOC Analysis
  • Endpoint Analysis
  • Network Traffic Analysis
  • Phishing Investigation

Offensive Security

  • Web Application Pentesting
  • API Security Testing
  • Authentication Testing
  • OWASP Top 10
  • Vulnerability Assessment
  • Exploitation Labs
  • Command Injection
  • SSRF
  • RCE
  • XSS
  • SQL Injection

Tools & Technologies

  • Splunk
  • ELK Stack
  • Sigma Rules
  • Wireshark
  • Sysmon
  • Volatility
  • Nmap
  • Burp Suite
  • Kali Linux
  • Suricata
  • Zeek
  • Windows Event Logs
  • Linux Logs
  • VirusTotal
  • Any.Run
  • CyberChef

Featured Repositories

SOC Investigations & DFIR

SOC Hands-on Investigation and Challenges

Professional SOC investigation repository containing real world blue team investigations, malware analysis, phishing investigations, endpoint forensics, threat hunting, and network traffic analysis challenges.

Repository:

Investigations Include:

  • Endpoint Analysis
  • Malware Analysis
  • Network Traffic Analysis
  • Phishing Analysis
  • Threat Intelligence Reports
  • CVE Analysis
  • Log Investigations
  • DFIR Workflows

Detection Engineering & SIEM

SOC-ELK-Sigma

Hands on SIEM engineering and detection repository focused on ELK Stack, Sigma rules, security monitoring, and detection logic creation.

Repository:

Focus Areas:

  • Sigma Rules
  • ELK Stack
  • Detection Engineering
  • Threat Detection
  • Log Correlation
  • SIEM Monitoring

Web Application Security

WebSec-Playbook

Comprehensive web application security repository covering practical exploitation and mitigation techniques for modern web vulnerabilities.

Repository:

Topics Include:

  • SSRF
  • RCE
  • Command Injection
  • SQL Injection
  • XSS
  • XXE
  • Broken Access Control
  • File Upload Vulnerabilities
  • Host Header Poisoning
  • Prototype Pollution

WebApp-Pentesting

Practical web application penetration testing repository with vulnerability assessments, exploitation techniques, and security testing workflows.

Repository:


API Security

API-security-testing-framework

API security testing project focused on authentication testing, API vulnerability discovery, authorization bypasses, and API attack surface analysis.

Repository:


Blue Team Mini Projects

Mini-BlueTeam-Projects

Collection of blue team projects focused on monitoring, alerting, detection engineering, and SOC automation concepts.

Repository:


Pentesting & CTF

PenTest-and-CTF

Hands on penetration testing labs and Capture The Flag writeups documenting exploitation methodologies, privilege escalation techniques, reconnaissance, and post-exploitation.

Repository:

Topics Include:

  • Enumeration
  • Privilege Escalation
  • Web Exploitation
  • Linux PrivEsc
  • Network Reconnaissance
  • CTF Walkthroughs

Investigation Areas

  • Malware Analysis
  • Threat Hunting
  • Endpoint Detection
  • Windows Forensics
  • Linux Log Analysis
  • Web Attack Analysis
  • Network Forensics
  • Phishing Investigations
  • SIEM Alert Triage
  • IOC Correlation
  • Threat Intelligence
  • Authentication Abuse
  • Privilege Escalation
  • Persistence Mechanisms
  • Suspicious PowerShell Activity
  • Web Shell Detection
  • Cloud Attack Detection

Current Focus

  • Advanced Threat Hunting
  • Detection Engineering
  • SOC Automation
  • Cloud Security Monitoring
  • API Security
  • Advanced Web Exploitation
  • Malware Traffic Analysis
  • DFIR Investigations

Learning Platforms

  • PortSwigger Web Security Academy
  • TryHackMe
  • Hack The Box
  • CyberDefenders
  • BTLO
  • RangeForce

Certifications & Learning

  • Data Science
  • Python
  • SQL
  • Power BI
  • Tableau
  • Machine Learning
  • TensorFlow
  • SAS Certifications
  • Cybersecurity Labs
  • Network Security
  • Ethical Hacking

Connect

GitHub:

LinkedIn:


"Security investigations are built through practice, curiosity, and continuous analysis."

Popular repositories Loading

  1. SOC-Hands-on-Investigation-and-Challenges SOC-Hands-on-Investigation-and-Challenges Public

    SOC / DFIR investigations portfolio with hands-on lab cases covering SIEM alert triage, Phishing Analysis, Malware analysis, Endpoint detection, Network Analysis. Built to demonstrate practical SOC…

    1

  2. Black-Hat-Python Black-Hat-Python Public

    This repository contains Python scripts and tools focused on offensive security and penetration testing, inspired by real-world black hat Python techniques used in ethical hacking and red team oper…

    Python 1

  3. Mini-BlueTeam-Projects Mini-BlueTeam-Projects Public

    SecForge is a collection of practical cybersecurity and blue team projects focused on threat detection, intrusion detection, secure coding, vulnerability assessment, and security automation. It dem…

    Python 1

  4. Offensive-Code-Labs Offensive-Code-Labs Public

    A Simple C program showing a buffer overflow vulnerability

    C

  5. PenTest-and-CTF PenTest-and-CTF Public

    Hands on Pentesting and CTF repository covering vulnerability analysis, exploitation, web and network attacks and offensive insights. Includes practical labs, write ups, tools, and scripts focused …

  6. SOC-ELK-Sigma SOC-ELK-Sigma Public

    Custom SOC pipeline with ELK stack, Logstash, Sigma rules, and Kibana dashboards for threat detection.