I am a passionate cybersecurity researcher specializing in ethical hacking, penetration testing, and digital threat analysis. I focus on the intersection of offensive and defensive security to build resilient digital defenses.
- Red Team (Offense): Penetration Testing, Vulnerability Assessment.
- Blue Team (Defense): Threat Hunting, Incident Response, SIEM Analysis.
- Purple Team (Integration): Security Architecture, Risk Assessment.
A curated list of core tools and technologies I use:
| Category | Tools/Technologies |
|---|---|
| Offensive Security | Metasploit Burp Suite BloodHound Hashcat Shodan |
| Defensive Security | Splunk QRadar Wireshark MITRE ATT&CK OpenEDR |
| Programming | Python Bash PowerShell SQL |
| Systems/Cloud | Kali Linux Ubuntu Windows Docker Kubernetes |
A commitment to continuous learning in both offensive and defensive security.
Highlights of my practical work and research:
- Bangladesh Gov Breach Analysis: Advanced Threat Intelligence Research on real-world government data breach incidents. (
Python,Threat Intelligence,OSINT) - NovaEncryptor CLI Tool: Command-line suite for military-grade cryptographic data protection. (
Python,Cryptography,CLI) - CyberBarrier Firewall: Custom network security framework with intelligent threat detection and automated response. (
Python,Network Security,Automation) - Crypto IR Simulation: Full incident response playbook and forensic analysis for a simulated cryptocurrency exchange hack. (
Incident Response,Digital Forensics)
Recent publications sharing knowledge on advanced security topics:
- Offensive: Kerberos Deep Dive Analysis | AD Hacking Guide
- Defensive: Domain Controller Hardening | Insider Threat Prevention
