Skip to content
View muhammad4208's full-sized avatar
🎯
Focusing
🎯
Focusing
Block or Report

Block or report muhammad4208

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
muhammad4208/README.md

Hi, I'm Muhammad Abdullah πŸ‘‹

Releases
Red Teaming Methodology

Β 

Β 

Hi! I'm *Muhammad Abdullah*, a Pentester || Linux Admin || Cybersecurity Consultant || IT Support Technician.

What's my development setup?

  • πŸ’» My laptop runs on Windows 10 Pro
  • πŸ‘¨β€πŸ’» For my terminal, I use Kali Linux and Parrot Security.
  • πŸ› οΈ For IDEs, I use Visual Studio code, and Python for scripting.
  • 🐳 For containerization, I use Docker.
  • 🌊 Currently, I post all my blogs to a Medium.

What's my typical coding day?

  • πŸ“˜ If working on a defense side, I would most likely use Nessus, OpenVas, snort, and MITRE framework.
  • πŸ“• If working on an offensive side, I would most likely use Nmap, Nikto, Burp Suite, Metasploit, and Python for workflow automation.
  • 🏫 University Lately, I developed a Linux GUI application using Python to automate banner grabbing and vulnerability analysis. The application simplified essential cybersecurity tasks, including Network Scanning, Subdomain Enumeration, Content Discovery, Web Analysis, Technology Detection, and Vulnerability Analysis. It also provided comprehensive reporting for these tasks.

What am I working on?

  • 🏴Capturing the flags on tryhackme and HTB.
  • πŸ”¨ If you want to read more about some of the blogs I've written on, visit my online Blogging Site.

What am I currently learning?

  • 🏫 I'm doing the Red Team Path on TryHackme and also capturing the flag (CTF) rooms.

Some helpful resources

  • πŸ’» Tryhackme is a great hands-on online platform by Ashu Savani and Ben Spring. When examining TryHackMe's stellar reputation within the cyber security sector on multiple platforms, it's clear that it is extraordinarily well suited to newbies.
  • 🐍 Effective Python by Brett Slatkin is a great book full of advice that will help anyone write better Python code. The book contains a bunch of self-contained lessons that shine a light into the language strengths and expressiveness. It is truly excellent!
  • 🦈 OverTheWire by Steven Van Acker Through engaging games, the OverTheWire community can assist you in learning and applying security ideas. They provide a variety of wargames to improve your skills.
  • ⏰ Cracking the Coding Interview. This book is pretty dense, but it's an excellent resource for preparing for a technical interview in any language.

Let's connect!

  • 🀝 To learn more about my journey, visit my LinkedIn profile, and let's connect. I'm always happy to chat with fellow developers.

Popular repositories

  1. muhammad4208 muhammad4208 Public

  2. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python

  3. RedTeam-OffensiveSecurity RedTeam-OffensiveSecurity Public

    Forked from bigb0sss/RedTeam-OffensiveSecurity

    Tools & Interesting Things for RedTeam Ops

    Python

  4. rumibookshop.github.io rumibookshop.github.io Public

    PHP

  5. RedTeam-Tools RedTeam-Tools Public

    Forked from A-poc/RedTeam-Tools

    Tools and Techniques for Red Team / Penetration Testing