- π§βπ BSc in Computer Science (Cybersecurity) at NED University
- π οΈ Skilled with: SIEM, XDR, EDR, IDS/IPS, Suricata, Zeek, Wireshark, Nessus, Metasploit
- π§ Passionate about Blue Team operations, threat detection, and building automated security pipelines
bash Languages : Python | Bash | SQL | C++ Security Tools : Suricata | Zeek | Wireshark | Nmap | Metasploit | Nessus | ELK Stack Platforms : Linux (Ubuntu, Kali) | Windows Concepts : SIEM, XDR, Threat Hunting, Network Forensics, Log Analysis, Vulnerability Scanning
- β Ethical Hacking Essentials β EC-Council
- β Cybersecurity Essentials β IBM
- β Linux Fundamentals β Cybrary
- β Networking Essentials β Cisco
- β Huawei HCIA-Datacom β Networking & Infrastructure
-
π XDR Lab (ELK + Zeek + Suricata)
Created a custom Extended Detection and Response (XDR) setup to detect malware, port scans, brute-force attempts using Kibana dashboards and alerting. -
βοΈ CTF Challenge Logs
Writeups and detection rules inspired by CTF experiences (Trend Micro, Cyber Combat, etc.) -
π SIEM Rules & Use Cases
Practical detection logic and correlation rules for brute-force, malware beaconing, and DDoS.
-
π Pentest-Toolkit-For-Reconaissance-And-Enumeration
A modular penetration testing toolkit for reconnaissance, enumeration, and exploitation simulation, featuring integrated tools and AI-assisted threat analysis. -
π οΈ binary-analyzer
Binary Analyzer is a Python-based malware analysis tool that inspects executable binaries using the LIEF library. It includes modules for anomaly detection, entropy analysis, and signature checking, helping cybersecurity professionals identify potential threats in PE files.
"The quieter you become, the more you are able to hear." β Cybersecurity begins in the logs.

