Skip to content
View Furqan1208's full-sized avatar

Highlights

  • Pro

Block or report Furqan1208

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Furqan1208/README.md

πŸ–₯️ Furqan Patel β€” Cybersecurity Explorer


πŸ‘¨β€πŸ’» About Me

  • πŸ§‘β€πŸŽ“ BSc in Computer Science (Cybersecurity) at NED University
  • πŸ› οΈ Skilled with: SIEM, XDR, EDR, IDS/IPS, Suricata, Zeek, Wireshark, Nessus, Metasploit
  • 🧠 Passionate about Blue Team operations, threat detection, and building automated security pipelines

πŸ›‘οΈ Cybersecurity Tools & Skills

bash Languages : Python | Bash | SQL | C++ Security Tools : Suricata | Zeek | Wireshark | Nmap | Metasploit | Nessus | ELK Stack Platforms : Linux (Ubuntu, Kali) | Windows Concepts : SIEM, XDR, Threat Hunting, Network Forensics, Log Analysis, Vulnerability Scanning


πŸ“œ Certifications

  • βœ… Ethical Hacking Essentials – EC-Council
  • βœ… Cybersecurity Essentials – IBM
  • βœ… Linux Fundamentals – Cybrary
  • βœ… Networking Essentials – Cisco
  • βœ… Huawei HCIA-Datacom – Networking & Infrastructure

🚧 Projects & Labs

  • πŸ” XDR Lab (ELK + Zeek + Suricata)
    Created a custom Extended Detection and Response (XDR) setup to detect malware, port scans, brute-force attempts using Kibana dashboards and alerting.

  • βš”οΈ CTF Challenge Logs
    Writeups and detection rules inspired by CTF experiences (Trend Micro, Cyber Combat, etc.)

  • πŸ“œ SIEM Rules & Use Cases
    Practical detection logic and correlation rules for brute-force, malware beaconing, and DDoS.


πŸ“‚ Repositories

  • πŸ”— Pentest-Toolkit-For-Reconaissance-And-Enumeration
    A modular penetration testing toolkit for reconnaissance, enumeration, and exploitation simulation, featuring integrated tools and AI-assisted threat analysis.

  • πŸ› οΈ binary-analyzer
    Binary Analyzer is a Python-based malware analysis tool that inspects executable binaries using the LIEF library. It includes modules for anomaly detection, entropy analysis, and signature checking, helping cybersecurity professionals identify potential threats in PE files.


"The quieter you become, the more you are able to hear." – Cybersecurity begins in the logs.


πŸ“¬ Contact Me

LinkedIn Gmail

Pinned Loading

  1. Pentest-Toolkit-For-Reconaissance-And-Enumeration Pentest-Toolkit-For-Reconaissance-And-Enumeration Public

    A modular penetration testing toolkit for reconnaissance, enumeration, and exploitation simulation, featuring integrated tools and AI-assisted threat analysis.

    Python 1

  2. Binary-Analyzer Binary-Analyzer Public

    Binary Analyzer is a Python-based malware analysis tool that inspects executable binaries using the LIEF library. It includes modules for anomaly detection, entropy analysis, and signature checking…

    Python

  3. Coding-Club-Website Coding-Club-Website Public

    The repository hosts the website of the Coding Club. It provides an engaging platform to showcase the club's events, resources, and team. Designed with a modern interface, the site is responsive an…

    CSS

  4. Suricata-Monitoring-Automation Suricata-Monitoring-Automation Public

    A comprehensive solution for deploying Suricata, monitoring its logs, and automating email notifications for real-time alerts.

    Python

  5. MindBoggleCardGame-OOP_PROJECT MindBoggleCardGame-OOP_PROJECT Public

    Mind Boggle: Cards Edition - Test your strategic thinking and memory skills in a card game featuring AI bots with unique personalities and difficulty levels.

    C++