Skip to content
View Varshith2802's full-sized avatar

Block or report Varshith2802

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Varshith2802/README.md

Security researcher focused on vulnerability assessment, exploit reproduction, and ML-driven intrusion detection. I like turning noisy telemetry into reliable, real-time detection.

Email   |   LinkedIn   |   GitHub

💡 What I’m About

  • Offense-informed defense: reproduce exploits → codify detections → measure impact
  • IDS/IPS, network forensics, and security automation with Python/Go
  • Shipping practical tools over academic toys

💻 Tech Stack


🚀 Featured Projects

🛡️ Intelligent Intrusion Detection System (IDS)

 Code 

ML-based, real-time packet capture & protocol analysis (TCP/UDP/HTTP). Benchmarked for latency, throughput, and false positives.
Network Security, ML, Scapy, Real-time


🔎 Automated Vulnerability Assessment Toolkit

 Code 

Concurrent TCP scanning, banner ID, heuristic vuln detection; emits HTML/JSON reports for triage.
Recon, Automation, Reporting


⌨️ Keylogger (Educational PoC)

 Code 

Awareness demo used to teach detection & prevention techniques.
Security Awareness, Monitoring


Smart DSS — Cybersecurity Risk in Ports

 Code 

Rule-based + ML anomaly scoring for vendor/third-party risk in maritime/port environments.
Risk, Anomaly Detection, Decision Support

…and more 🗂️ explore my projects.


🧪 Labs & Write-ups

  • 🧰 Exploit Repro — turning CVEs into detections & mitigations
  • 🔎 Packet Stories — short Wireshark/Scapy deep-dives
  • 📓 TTP Notes — ATT&CK techniques with practical detection rules
    (Publishing public write-ups soon.)

📜 Certifications

  • Google Cybersecurity
  • EC-Council: Digital Forensics for Pentesters
  • FEMA NIMS ICS-100
  • Incident Response Planning & Management

📚 Currently Learning

  • Suricata rule tuning & performance profiling
  • Go for high-performance network tooling
  • Streamlining DFIR playbooks with automation

🤝 Let’s Connect

📍 Karlskrona, Sweden ✉️ ntvsagar@gmail.com 💼 linkedin.com/in/varshithsagar

Popular repositories Loading

  1. MAJOR-PROJECT MAJOR-PROJECT Public

    HTML 1

  2. MINOR-PROJECT MINOR-PROJECT Public

    JavaScript 1

  3. INTELLIGENT-INTRUSION-DETECTION-SYSTEM INTELLIGENT-INTRUSION-DETECTION-SYSTEM Public

    Python 1

  4. Keylogging Keylogging Public

    Python 1

  5. Vulnerability-Scanner Vulnerability-Scanner Public

    Python 1

  6. ip-reputation-checker ip-reputation-checker Public

    HTML 1