Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View rodanmaharjan's full-sized avatar
  • Vairav Technology
  • Nepal
  • 01:22 (UTC +05:45)
  • Codestin Search App in/rodanmaharjan

Block or report rodanmaharjan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
rodanmaharjan/README.md

👋 Hi, I’m @rodanmaharjan

👀 I’m interested in cybersecurity, networking, programming, and web development.

🌱 I’m a BSc (Hons) graduate in Networking and IT Security and working as a Cyber Threat Intelligence Analyst at Vairav Technology.

💞️ I’m looking to collaborate on projects related to Cyber Security.

📫 Reach me out at [email protected]

Pinned Loading

  1. ThreatIntelligence ThreatIntelligence Public

    This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident respons…

    Python 115 21

  2. threat-detection threat-detection Public

    A curated collection of Sigma rules to detect malicious behavior, adversary techniques, and indicators of compromise across different threat categories — including Remote Access Trojans (RATs), Adv…

    4

  3. virus-total-threat-intel virus-total-threat-intel Public

    A Python-based threat intelligence tool to detect malicious IPs, Domains and URLs using VirusTotal's API. Ideal for CTI analysts to automate IP and URL reputation checks and track potential threats.

    Python 3

  4. CTI CTI Public

    Materials for CTI

    2

  5. X-IOCs-Extract X-IOCs-Extract Public

    A lightweight Python tool to automatically extract Indicators of Compromise (IOCs) — such as domains, IPs, URLs, and hashes — from posts on X (formerly Twitter). This script is intended for threat …

    Python 1

  6. MalwareHash MalwareHash Public

    It downloads the malware hash from Malware bazzar and stores on a text file

    Python 1 1