Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View SushankYerva's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report SushankYerva

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SushankYerva/README.md

Hello, I'm Sushank Yerva

I am a recent graduate in Cybersecurity with a strong foundation in security, network defense, and systems monitoring. I am passionate about applying analytical thinking to solve cybersecurity problems and ensure system resilience.

Objective

As a Meng Cybersecurity graduate, I aim to leverage my skills in incident response, SIEM tools, and cloud security to transition into a Security Engineer or Analyst.

Skills

Skill Associated Project
Network Traffic Monitoring and Attack Detection ThreatScope
End-to-End Encryption (E2EE) and Secure Protocol design (CIA Triad) E2EKeyEstablishmentProtocol
Threat Modelling and RisK Mitigation E2EKeyEstablishmentProtocol
Cryptography and GUI Development Wallet Recovery

Tools

Network

Endpoint

SIEM

Projects

  • ThreatScope: ThreatScope is an cybersecurity and machine-learning project that performs real-time network intrusion detection. It captures packets, computes flow-level statistics, applies a trained ML classifier (XGBoost), and logs malicious traffic through a REST API or SQLite database.
  • Key Establishment Protocol: A protocol allowing three entities (A, B, C) to establish a mutually agreed session key, ensuring Confidentiality, Integrity, Availability, and Non–Repudiation.
  • Wallet Recovery GUI: A GUI-based application for cryptocurrency wallet seed phrase recovery as part of my Master’s project.

Pinned Loading

  1. ThreatScope ThreatScope Public

    ThreatScope is an cybersecurity and machine-learning project that performs real-time network intrusion detection.

    Python 1

  2. E2EKeyEstablishmentProtocol E2EKeyEstablishmentProtocol Public

    A key establishment protocol that will allow a Mutually Agreed Session key to be established between three entities A, B and C to secure a chat between them ensuring Confidentiality, Integrity, Ava…

    Python 1

  3. wallet_recovery wallet_recovery Public

    A Python-based Tkinter GUI to recover wallets using mnemonic seeds and key derivations.

    Python 1