Skip to content
View deadpackettt's full-sized avatar

Block or report deadpackettt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
deadpackettt/README.md

Hi, I'm Xumoyun

Cybersecurity Student | SOC Analyst Path | Blue Team | Detection | Incident Analysis


About Me

  • 3rd-year Cybersecurity student
  • Focused on SOC operations, incident response, and practical security labs
  • Interested in threat detection, log analysis, brute force detection, phishing analysis, and network security
  • Building real cybersecurity projects and GitHub case studies
  • Continuously improving Linux, networking, and defensive security skills

Skills & Tools

Security

  • SIEM Basics
  • Event ID Analysis
  • Incident Investigation
  • Brute Force Detection
  • Phishing Analysis
  • Network Traffic Analysis
  • Access Control Testing
  • Web Security Basics

Tools

  • Kali Linux
  • Wireshark
  • Burp Suite
  • Hydra
  • Nmap
  • Wazuh (learning)
  • Linux Terminal
  • VirtualBox
  • Git / GitHub
  • Python (basic scripting)

Projects

ARP Spoofing Attack Analysis

MITM attack simulation in a controlled lab environment with traffic interception analysis and mitigation strategies.

IDOR Vulnerability Analysis

Broken Access Control testing using PortSwigger and Burp Suite with unauthorized object reference manipulation.

DVWA Brute Force Analysis

Authentication attack simulation against DVWA login forms using Hydra and request analysis.

SSH Brute Force Attack

Brute force testing against SSH service on port 22 with authentication monitoring and defense recommendations.

Phishing Simulation

Credential harvesting simulation using SEToolkit with phishing awareness and mitigation strategies.

Google Dorking Security Analysis

OSINT-based exposure analysis using search engine indexing and security misconfiguration discovery.


Learning Progress

  • TryHackMe
  • PicoCTF
  • Linux Security Labs
  • Wazuh Detection Labs
  • SOC Incident Analysis
  • Blue Team Fundamentals

Currently improving practical detection and incident response skills for junior SOC roles.


Goal

Build strong technical skills and practical experience to become a reliable Junior SOC Analyst and grow in Blue Team operations.


Popular repositories Loading

  1. ARP-spoofing ARP-spoofing Public

    1

  2. Phishing-simulation Phishing-simulation Public

    1

  3. IDOR IDOR Public

    1

  4. dvwa-bruteforce-analysis dvwa-bruteforce-analysis Public

    1

  5. deadpackettt deadpackettt Public

    1

  6. Google-Dorking Google-Dorking Public