π Cybersecurity Student
π Penetration Tester & Security Enthusiast
π‘οΈ Passionate about safeguarding digital infrastructures. Skilled in network security, penetration testing, incident response, auditing, and risk assessment.
- Description: Developed a real-time intrusion detection system that monitors network traffic for suspicious activity.
- Tech Stack: Python, Scapy, Snort
- Key Features:
- Pattern-based and anomaly-based detection
- Real-time alerting system for potential threats
- Extensible with custom rule sets
- Project Link: CodeAlpha_network_intrusion_detection_system
- Description: Created a network packet sniffer capable of capturing and analyzing network traffic.
- Tech Stack: Python, Scapy, Wireshark
- Key Features:
- Capture, filter, and decode live packet data
- Analyze protocols like TCP, UDP, ICMP
- Easy-to-use CLI for monitoring network interfaces
- Project Link: CodeAlpha_basic_network_sniffer
- Description: Built a tool to monitor and verify file integrity across a system to detect unauthorized changes.
- Tech Stack: Python, Hashlib
- Key Features:
- File integrity monitoring with hashing algorithms (SHA-256, MD5)
- Real-time alerts on file modification
- Support for large-scale file systems
- Project Link: Integrity Monitoring
- Description: Developed a password monitoring tool to ensure password policies are enforced and identify weak passwords.
- Tech Stack: Python, PyCryptodome
- Key Features:
- Password strength evaluation
- Dictionary attacks and brute-force prevention
- Real-time monitoring of password hashes
- Project Link: Password Checker
- Description: Created a simple keylogger for educational purposes, demonstrating how keylogging works in controlled environments.
- Tech Stack: Python, Pynput
- Key Features:
- Logs all keystrokes with timestamp
- Stealth mode operation
- Secure data storage and encryption
- Project Link: Keylogger
- Offensive Security: Exploring advanced penetration testing methodologies and techniques with Kali Linux.
- Reverse Engineering: Studying how to analyze and exploit vulnerabilities in software applications.
- Web Application Security: Focusing on OWASP Top 10 vulnerabilities like SQL Injection and Cross-Site Scripting (XSS).
- LinkedIn: Arbaz Akbar
- GitHub: Arbaz Akbar