Focused on hands on cybersecurity investigations, blue team operations, digital forensics, web application security testing, and offensive security labs. Experienced in investigating real world attack scenarios, log analysis, endpoint investigations, phishing analysis, network forensics, SIEM engineering, and web exploitation techniques.
I am a cybersecurity enthusiast focused on Security Operations Center (SOC) investigations, Digital Forensics & Incident Response (DFIR), threat hunting, and web application security.
My work is heavily hands on and investigation driven. I continuously build practical labs, detection engineering projects, SIEM environments, penetration testing labs, and real world incident investigations to strengthen my blue team and offensive security skills.
I actively document:
- Security investigations
- Incident response workflows
- Threat hunting methodologies
- Malware behavior analysis
- Network traffic investigations
- Web application vulnerabilities
- Detection engineering
- API security testing
- Capture The Flag (CTF) writeups
- Security Monitoring
- Threat Hunting
- SIEM Analysis
- Log Correlation
- Incident Response
- Digital Forensics
- Malware Investigation
- IOC Analysis
- Endpoint Analysis
- Network Traffic Analysis
- Phishing Investigation
- Web Application Pentesting
- API Security Testing
- Authentication Testing
- OWASP Top 10
- Vulnerability Assessment
- Exploitation Labs
- Command Injection
- SSRF
- RCE
- XSS
- SQL Injection
- Splunk
- ELK Stack
- Sigma Rules
- Wireshark
- Sysmon
- Volatility
- Nmap
- Burp Suite
- Kali Linux
- Suricata
- Zeek
- Windows Event Logs
- Linux Logs
- VirusTotal
- Any.Run
- CyberChef
Professional SOC investigation repository containing real world blue team investigations, malware analysis, phishing investigations, endpoint forensics, threat hunting, and network traffic analysis challenges.
Repository:
Investigations Include:
- Endpoint Analysis
- Malware Analysis
- Network Traffic Analysis
- Phishing Analysis
- Threat Intelligence Reports
- CVE Analysis
- Log Investigations
- DFIR Workflows
Hands on SIEM engineering and detection repository focused on ELK Stack, Sigma rules, security monitoring, and detection logic creation.
Repository:
Focus Areas:
- Sigma Rules
- ELK Stack
- Detection Engineering
- Threat Detection
- Log Correlation
- SIEM Monitoring
Comprehensive web application security repository covering practical exploitation and mitigation techniques for modern web vulnerabilities.
Repository:
Topics Include:
- SSRF
- RCE
- Command Injection
- SQL Injection
- XSS
- XXE
- Broken Access Control
- File Upload Vulnerabilities
- Host Header Poisoning
- Prototype Pollution
Practical web application penetration testing repository with vulnerability assessments, exploitation techniques, and security testing workflows.
Repository:
API security testing project focused on authentication testing, API vulnerability discovery, authorization bypasses, and API attack surface analysis.
Repository:
Collection of blue team projects focused on monitoring, alerting, detection engineering, and SOC automation concepts.
Repository:
Hands on penetration testing labs and Capture The Flag writeups documenting exploitation methodologies, privilege escalation techniques, reconnaissance, and post-exploitation.
Repository:
Topics Include:
- Enumeration
- Privilege Escalation
- Web Exploitation
- Linux PrivEsc
- Network Reconnaissance
- CTF Walkthroughs
- Malware Analysis
- Threat Hunting
- Endpoint Detection
- Windows Forensics
- Linux Log Analysis
- Web Attack Analysis
- Network Forensics
- Phishing Investigations
- SIEM Alert Triage
- IOC Correlation
- Threat Intelligence
- Authentication Abuse
- Privilege Escalation
- Persistence Mechanisms
- Suspicious PowerShell Activity
- Web Shell Detection
- Cloud Attack Detection
- Advanced Threat Hunting
- Detection Engineering
- SOC Automation
- Cloud Security Monitoring
- API Security
- Advanced Web Exploitation
- Malware Traffic Analysis
- DFIR Investigations
- PortSwigger Web Security Academy
- TryHackMe
- Hack The Box
- CyberDefenders
- BTLO
- RangeForce
- Data Science
- Python
- SQL
- Power BI
- Tableau
- Machine Learning
- TensorFlow
- SAS Certifications
- Cybersecurity Labs
- Network Security
- Ethical Hacking
GitHub:
LinkedIn:
"Security investigations are built through practice, curiosity, and continuous analysis."