Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View atharimran728's full-sized avatar
Cybersecurity Artist
Cybersecurity Artist

Block or report atharimran728

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Insider-Threat-s-Lateral-Movement-Simulation-Detection-Identification-using-NetworkMiner3.0-Zeek Insider-Threat-s-Lateral-Movement-Simulation-Detection-Identification-using-NetworkMiner3.0-Zeek Public

    Simulated and detected a stealthy insider threat ‘Alex’, who moved from file snooping to SSH brute-forcing. Includes PCAPs, Zeek logs, NetworkMiner analysis, and a full incident report.

  2. Snort-IDS-IPS-Detection-and-Evasion Snort-IDS-IPS-Detection-and-Evasion Public

    This repository contains the detailed project report and configuration files for a Proof of Concept (PoC) demonstrating the capabilities of Snort as an Intrusion Detection System (IDS) and Intrusio…

  3. Web-Application-Security-Strengthening Web-Application-Security-Strengthening Public

    This repository contains reports for all tasks assigned by DevelopersHub.co during the June 2025 internship period. These tasks involved analyzing a simple user management system for vulnerabilitie…

    JavaScript

  4. Deployment-and-Integration-of-Wazuh-SIEM Deployment-and-Integration-of-Wazuh-SIEM Public

    This assignment is submitted to Bytewsie Cybersecurity fellowship, Sep 2024. The goal of this assignment is to gain hands-on experience with deploying Wazuh SIEM, integrating it with other machines…

  5. Integrated-Cyber-Threat-Intelligence-Reports Integrated-Cyber-Threat-Intelligence-Reports Public

    This repository conatines the five reports that was created for a scenrio in which a company is attacked by Malware. This assignment the part of Bytewise Fellowship in Cybersecurity.

  6. DVWA-Pentest-report DVWA-Pentest-report Public

    This repository contians the report of pentesting performed on a vulnerable web application named DVWA (Damn Vulnerability Web Application). This contains 16 vulnerabilites to exploit with level lo…