Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View ewanoleghe's full-sized avatar

Block or report ewanoleghe

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ewanoleghe/README.md

πŸ‘‹ Hi, I’m @ewanoleghe – Cybersecurity Analyst & Offensive Security Engineer


πŸ” SOC Analyst | Penetration Tester | OT/ICS Security Enthusiast
I began my professional journey as a soil physicist, earning a Ph.D. in Soil Physics and conducting advanced research in soil hydrodynamics, carbon modeling, and geospatial data analysis. I was a former full-stack developer with 15+ years in secure software engineering, now focused on threat detection, incident response, penetration testing, and operational technology (OT) security. Certified in CompTIA Security+ and AWS Cloud Practitioner, actively pursuing OSCP and CySA+.


πŸ›‘οΈ Cybersecurity Expertise

  • πŸ” SOC Operations: SIEM (Splunk, Microsoft Sentinel, ELK), EDR (Carbon Black), phishing analysis, threat hunting
  • 🧨 Offensive Security: Penetration testing with Metasploit, Nmap, Burp Suite, Wireshark, Nessus, privilege escalation
  • ☁️ Cloud & Infrastructure: AWS IAM, GuardDuty, CloudTrail, Zero Trust, secure network architecture
  • 🏭 OT/ICS Security: Modbus/BACnet simulation, Purdue Model, ISA/IEC 62443 alignment
  • 🐍 Security Automation: Python (Pandas, NumPy) for log correlation, anomaly detection, Splunk dashboarding

πŸ§ͺ Active Labs & Red Team Training

  • Hack The Box CPTS (In Progress) – 15+ machines, focus on Linux/Windows privilege escalation
  • OSCP Labs – Buffer overflows, web app exploitation, Active Directory attacks
  • SIEM Home Lab – Splunk-based SOC simulation with real-time threat detection & NIST 800-61 workflows
  • Container & API Hardening – Trivy/Clair scans, OWASP Top 10 testing with Burp Suite/Postman
  • ICS Cyber Range – Simulated attacks on industrial protocols (Modbus, BACnet)

πŸ”¬ Currently Mastering

  • Advanced Active Directory attacks & lateral movement
  • Purple teaming & MITRE ATT&CK framework mapping
  • YARA, Sigma, and custom detection rules for SIEM
  • Kotlin for secure mobile app development

MITRE ATT&CK in Practice

Tactic Technique Application
Initial Access T1190 – Exploit Public App Laravel debug mode β†’ RCE
Execution T1059.006 – Python Reverse shell via cron
Persistence T1053 – Scheduled Task at job + encoded payload
Privilege Escalation T1068 – Kernel Exploit Dirty COW, SUID binary
Defense Evasion T1070.004 – Log Clear shred, wevtutil cl
Lateral Movement T1021.001 – RDP Pass-the-Hash + RDP
Exfiltration T1041 – C2 Channel DNS tunneling, HTTPS POST

OSCP Preparation Guide (90-Day Roadmap)

Phase 1: Foundation (Weeks 1–3)

  • Master Linux/Windows CLI, netstat, wmic, tasklist
  • Complete TJNull’s HTB List (50 retired boxes)
  • Write one-liner enumeration scripts

Phase 2: Methodology (Weeks 4–6)

nmap -sC -sV -p- --min-rate 1000 -oA scan <IP>
gobuster dir -u http://<IP> -w medium.txt -x php,html,txt

🀝 Let’s Collaborate On

  • Open-source SIEM detection content (Splunk, Sigma)
  • Penetration testing tools & exploit development
  • OT security automation (IaC, Ansible, Python)
  • Threat intelligence platforms & automated phishing triage

πŸ“« Reach Me

Twitter (@e_oleghe)
πŸ“§ ewan.mails -{at}- gmail -|dot|- com
πŸ”— LinkedIn | GitHub


🧰 Cybersecurity & Tools Arsenal

AWS Python Splunk Microsoft Sentinel Carbon Black Metasploit Burp Suite Nmap Wireshark Docker Kali Linux


Pinned Loading

  1. CRUD CRUD Public

    Forked from Laravel-Backpack/CRUD

    Build custom admin panels. Fast!

    PHP

  2. Deep-Learning-in-R Deep-Learning-in-R Public

    Forked from dlab-berkeley/R-Deep-Learning

    Workshop (6 hours): Deep learning in R using Keras. Building & training deep nets, image classification, transfer learning, text analysis, visualization

    R

  3. 30-Day-SOC-Analyst-Challenge 30-Day-SOC-Analyst-Challenge Public

    Forked from ssultany/30-Day-SOC-Analyst-Challenge

    A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers threat detection, log analysis, incident response, and cloud-…

  4. Hack-the-Box-OSCP-Preparation Hack-the-Box-OSCP-Preparation Public

    Forked from rkhal101/Hack-the-Box-OSCP-Preparation

    Hack-the-Box-OSCP-Preparation

  5. MLwR_4 MLwR_4 Public

    Forked from dataspelunking/MLwR

    Machine Learning with R

    R

  6. PowerShell PowerShell Public

    Forked from PowerShell/PowerShell

    PowerShell for every system!

    C#