Skip to content
View Shubhomrawat's full-sized avatar

Block or report Shubhomrawat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Shubhomrawat/README.md
╔═══════════════════════════════════════════════════════════════════════════════╗
β•‘  β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘  β•‘
β•‘  β–‘                                                                         β–‘  β•‘
β•‘  β–‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ–ˆβ•—     β–‘  β•‘
β•‘  β–‘    β–ˆβ–ˆβ•”β•β•β•β•β• β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ•‘     β–‘  β•‘
β•‘  β–‘    β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ•‘     β–‘  β•‘
β•‘  β–‘     β•šβ•β•β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘     β–‘  β•‘
β•‘  β–‘    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β•šβ•β• β–ˆβ–ˆβ•‘     β–‘  β•‘
β•‘  β–‘    β•šβ•β•β•β•β•β•  β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β• β•šβ•β•     β•šβ•β•     β–‘  β•‘
β•‘  β–‘                        R A W A T                                        β–‘  β•‘
β•‘  β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘  β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•
Typing SVG

LinkedIn Instagram


$ cat /etc/profile

name       : Shubhom Rawat
role       : Cybersecurity Researcher & Security Engineer
location   : Pennsylvania State University, USA
degree     : M.S. Cybersecurity Analytics & Operations (2024–2026)
clearance  : [RESEARCHING...]
status     : Building the next line of defense

specializations:
  - Penetration Testing & Red Teaming
  - Malware Analysis & Reverse Engineering
  - Machine Learning for Threat Detection
  - Security Operations (SOC)
  - Web Application Security

current_ops:
  - ThreatLens        β†’ ML-Based Suspicious Login Detection
  - MalSandbox        β†’ Dynamic Malware Analysis Environment
  - AI-CyberDefense   β†’ Intelligent Threat Detection Pipeline

philosophy  : "Break it to understand it. Understand it to defend it."

$ ls -la /projects

πŸ”¬ Malware Analysis Sandbox β€” [ACTIVE]

Dynamic malware analysis pipeline powered by Cuckoo Sandbox + YARA rules.

What it does:

  • Detonates suspicious binaries in an isolated environment
  • Extracts behavioral signatures: network calls, registry changes, file I/O
  • Classifies malware families using YARA pattern matching
  • Generates automated threat reports

Stack: Python Cuckoo Sandbox YARA VirtualBox Linux

🧠 Malware Detection via Machine Learning β€” [DEPLOYED]

Network traffic-based malware classifier using ensemble methods.

What it does:

  • Captures and parses live/recorded network flows
  • Engineers features from packet metadata & behavioral patterns
  • Classifies malicious traffic using Random Forest & Decision Trees
  • Achieves high detection accuracy with low false-positive rates

Stack: Python Scikit-learn Pandas Wireshark/pcap Matplotlib

πŸ”— View Repository

⚑ ThreatLens β€” Suspicious Login Detection β€” [IN PROGRESS]

ML-powered anomaly detection system for identifying compromised credentials and account takeovers.

What it does:

  • Baselines normal user login behavior (time, location, device fingerprint)
  • Flags deviations using anomaly detection algorithms
  • Real-time alerting pipeline for SOC integration
  • Risk scoring per login event

Stack: Python TensorFlow FastAPI PostgreSQL Docker

🌐 NetInstall β€” Encrypted Multi-Machine Deployment β€” [STABLE]

Automated software deployment across distributed machines over encrypted virtual networks.

What it does:

  • Deploys applications to multiple nodes simultaneously
  • Leverages ZeroTier encrypted overlay networks for secure comms
  • Removes dependency on physical network access

Stack: Python ZeroTier Bash Linux

πŸ”— View Repository

πŸ’¬ ZenVerse β€” Secure Communications Platform β€” [STABLE]

Encrypted real-time messaging and collaboration platform.

πŸ”— View Repository


$ nmap --skills Shubhom

Starting skill scan...

PORT        STATE    SERVICE
22/tcp      open     penetration-testing
80/tcp      open     web-app-security
443/tcp     open     malware-analysis
514/tcp     open     siem-log-analysis        [Splunk | ELK]
8080/tcp    open     ml-threat-detection
9000/tcp    open     security-operations
9200/tcp    open     elasticsearch-hunting

Languages & Scripting

Python C++ C JavaScript Bash PowerShell

πŸ”΄ Offensive Security

Burp Suite Metasploit Nmap Hydra John the Ripper Hashcat SQLmap Aircrack-ng OWASP ZAP Gobuster

πŸ”΅ Defensive Security & SOC

Splunk Elastic Elasticsearch Kibana Logstash Wireshark Nessus Snort YARA Volatility

ML / Data Science

TensorFlow PyTorch scikit-learn Pandas NumPy

Infrastructure & DevSecOps

Linux Kali Linux Docker Git


$ cat /var/log/github-stats




$ cat /etc/motd

╔══════════════════════════════════════════════════════════════════╗
β•‘                                                                  β•‘
β•‘   THREAT MODEL:                                                  β•‘
β•‘   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β•‘
β•‘   β”‚  Recon β†’ Weaponize β†’ Deliver β†’ Exploit β†’ Install β†’     β”‚   β•‘
β•‘   β”‚  C2 β†’ Exfiltrate                                        β”‚   β•‘
β•‘   β”‚                  ↑                                      β”‚   β•‘
β•‘   β”‚             [I STOP THIS]                               β”‚   β•‘
β•‘   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β•‘
β•‘                                                                  β•‘
β•‘   "In cyberspace, the best offense is a better defense."        β•‘
β•‘   "Understand the attacker's mind. Build the defender's wall."  β•‘
β•‘                                                                  β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

$ ./connect.sh

Platform Handle
πŸ”— LinkedIn shubhom-rawat-45a2b522b
πŸ“Έ Instagram @0day.xploit_101
πŸ“˜ Facebook Profile

[+] Profile loaded successfully.
[+] Threat level: RESEARCHER
[+] Clearance: OPEN SOURCE
[>] If you found something interesting β€” drop a ⭐
[>] If you want to collaborate β€” ping me.
[>] Remember: security is not a product. It's a process.

Footer

Pinned Loading

  1. Malware-Detection-Using-ML Malware-Detection-Using-ML Public

    HTML

  2. aushadh-setu aushadh-setu Public

    JavaScript

  3. ZenVerse ZenVerse Public

    Forked from ZenEducation/ZenVerse

    Developing the communications platform

    Vue

  4. bLank-10/react-website bLank-10/react-website Public

    A live version is available on github pages at:

    JavaScript 2

  5. NetInstall1/Workstation NetInstall1/Workstation Public

    JavaScript

  6. Suspicious_Login-ATO_using-ML Suspicious_Login-ATO_using-ML Public

    JavaScript