Skip to content
View arham5siddiqui's full-sized avatar
🌐
AggressivelyDefending
🌐
AggressivelyDefending

Block or report arham5siddiqui

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. SIEM-Detection-Triage-Suricata SIEM-Detection-Triage-Suricata Public

    A deep dive into, SIEM processes, Triaging, frameworks and creating rules for network incident detection using Suricata.

  2. SIEM-VulnScan-Nessus SIEM-VulnScan-Nessus Public

    A detailed report on SIEM, Alerts prioritisation, and Nessus vulnerability scanning.

  3. incident-network-VM-Nmap incident-network-VM-Nmap Public

    A quick report on incident, network analysis and how it is useful in SOC (Security Operations Centre).

  4. phishing-email-analysis phishing-email-analysis Public

    A detailed phishing email analysis report with demo and project screenshots.

    1

  5. Mitigating-Linkability-Attacks-through-Differential-Privacy-enabled-Neural-Network-Training Mitigating-Linkability-Attacks-through-Differential-Privacy-enabled-Neural-Network-Training Public

    Implemented five Machine Learning algorithms using Google Colab.

    Jupyter Notebook 1

  6. WEB-APPLICATION-SECURITY-AND-VULNERABILITY-ANALYSIS-Sqli-attack- WEB-APPLICATION-SECURITY-AND-VULNERABILITY-ANALYSIS-Sqli-attack- Public

    Analysed a sample website for vulnerabilities, using BurpSuite and SQLmap to perform SQL injection attacks, including automated POST-based attacks and Google Dorks.