Skip to content
View Maharkk's full-sized avatar
  • Red Team Hacker Academy
  • Kerala, India
  • LinkedIn in/maharkk

Block or report Maharkk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Maharkk/README.md

πŸ‘¨β€πŸ’» Mahar Hassain K K - Cybersecurity Analyst

Welcome to my GitHub portfolio! I'm a passionate cybersecurity professional specializing in SOC analysis, with a strong background in security operations and penetration testing. My journey in cybersecurity is fueled by a continuous thirst for knowledge and a dedication to making the digital world a safer place.

With hands-on experience in monitoring and responding to security incidents using tools like Splunk and various vulnerability assessment platforms, I am committed to identifying and mitigating threats. Ranked in the top 1% on TryHackMe and among the top 50 in the UAE, I aim to contribute to meaningful cybersecurity projects and share knowledge with the community, particularly in the realm of SOC operations.

"This portfolio is a work in progress, and I will continue to update it with new projects, skills, and certifications as I grow in my cybersecurity career."

πŸ” About Me

  • Name: Mahar Hassain K K

  • Role: Cybersecurity Analyst | SOC Analyst | Penetration Tester

  • Experience: 1 years in Cybersecurity

  • Location: Dubai, United Arab Emirates

  • Specializations: Security Operations Center β€’ SIEM β€’ VAPT β€’ Compliance Management β€’ Cyber Threat Intelligence (CTI)

  • Email: [email protected]

  • LinkedIn: LinkedIn-Profile

  • Medium Blog/Writeups: Medium-Maharkk

  • Current Focus: Working on enhancing my skills in SOC analysis, with a strong passion for safeguarding critical systems and responding to security incidents.

Education πŸŽ“

B.Tech in Computer Science (Honors), Major: Cybersecurity
Lovely Professional University, Punjab, India
Graduated: 2023
CGPA: 7.41 / 10

Experience πŸ’Ό

Cybersecurity Trainee: SOC Analyst
Red Team Hacker Academy, Kerala, India
Duration: 7 months

  • Gained hands-on experience in security operations, monitoring, incident response, and penetration testing.
  • Conducted vulnerability assessments and simulated attacks to evaluate system security.
  • Worked with various tools and techniques for threat detection, analysis, and ethical hacking.

Cybersecurity Intern
Prodigy InfoTech (Remote)
Duration: 1 months

  • Working on practical cybersecurity projects, including encryption tools, password complexity checkers, keyloggers, and network packet analyzers.
  • Gaining hands-on experience in encryption techniques, network security, and ethical hacking.
  • Contributing to the development of security tools and techniques for real-world application.

πŸ† TryHackMe

image

πŸ†= Rank πŸ”₯= Streak πŸ…= Badges Earned πŸšͺ= Rooms Completed

πŸ…Notable Badges Acquired

TryHackMe Streak Badge 90 Day Streak TryHackMe OWASP Badge Owasp Top 10 TryHackMe Mr. Robot Badge Mr. Robot TryHackMe Linuxpriesc Badge Linuxpriesc TryHackMe Hash Cracker Badge Hash Cracker TryHackMe Burp Suite Badge Burp Suite TryHackMe FlareVM Badge FlareVM TryHackMe Burp Suite Badge Phishing TryHackMe Burp Suite Badge Boogeyman

πŸ› οΈ Skills

πŸ” Cybersecurity Skills

Cybersecurity Skills

Security Operations

  • Expertise in SIEM, SOC monitoring, log analysis, Snort, osquery, and security automation.

Threat Hunting

  • Skilled in techniques and tools like Splunk, Yara, Sysmon, Wazuh, Zeek, and Brim.

Incident Response

  • Hands-on experience with incident handling, response strategies, threat detection, and recovery processes.

Cyber Threat Intelligence

  • Proficient in identifying, analyzing, and responding to emerging threats.

Vulnerability Assessment

  • Experienced with tools such as OpenVAS, Nessus, WPScan, and Arachni.

Penetration Testing

  • Proficient in Metasploit Framework, Burp Suite, Nmap, Wireshark, NetworkMiner, and John the Ripper.

Additional Skills

  • Malware Analysis, Digital Forensics, Phishing Analysis, and Compliance Management.

πŸ’» Programming & Scripting

  • Languages:
    • Python: Automation, scripting, and development of security tools.
    • Bash: Scripting in Unix/Linux environments and automation tasks.
    • PowerShell: Windows system administration and scripting.
    • JavaScript: Web application security assessments.
    • SQL: Database querying and security testing.

πŸ–₯️ Operating Systems

  • Windows: Extensive experience with various versions for penetration testing, incident response, and system administration.
  • Linux: Proficient in distributions such as Kali Linux, Parrot, and Ubuntu for security assessments, scripting, and server management.

πŸ—‚οΈ Projects

1. Pixel Manipulation for Image Encryption

  • Description: Developed a simple image encryption tool using pixel manipulation techniques. The tool allows users to encrypt and decrypt images by performing operations like swapping pixel values or applying a basic XOR operation to each pixel. This project demonstrates basic image encryption and decryption methods, showcasing practical applications of pixel-level manipulations in image security.
  • Tools Used: Python, PIL (Pillow), NumPy
  • GitHub Repo: GitHub repository

2. Network Packet Analyzer

  • Description: Developed a packet sniffer tool that captures and analyzes network packets, displaying relevant information such as source and destination IP addresses, protocols, and payload data. The tool ensures ethical use by including a disclaimer and obtaining user consent before starting packet capture. This project demonstrates practical skills in network monitoring and packet analysis for educational purposes.
  • Tools Used: Python, Scapy
  • GitHub Repo: GitHub repository

3. Caesar Cipher Implementation

  • Description: Created a Python program that implements the Caesar Cipher algorithm for encrypting and decrypting text. The program allows users to input a message and a shift value to perform both encryption and decryption operations. This tool demonstrates the basic principles of classical encryption techniques and provides a practical example of how to apply the Caesar Cipher in text processing.
  • Tools Used: Python
  • GitHub Repo: GitHub repository

πŸŽ“ Certifications

  • Certified SOC Analyst (CSA)

  • Certified IT Infrastructure and Cyber SOC Analyst V3 (CICSA)

  • SOC Level 1

  • Jr Penetration Tester

  • Learn Ethical Hacking From Scratch 2024

πŸ† Achievements

Top 1% on TryHackMe

  • Rank: Achieved a position in the top 1% of users globally and among the top 50 in the UAE.
  • Level: Currently at max Level: GOD.
  • Highlights: Successfully completed various learning paths, maintained a consistent streak for over Five months, and earned numerous badges for achievements and milestones. TryHackMe's hands-on challenges have been pivotal in advancing my cybersecurity skills.

UHRS (Universal Human Relevance System)

  • Tasks Completed: Over 5,000 tasks.
  • Skills Demonstrated: Data analysis, security, and attention to detail.
  • Recognition: Received incentives for the successful completion of bug bounties and data labeling tasks, showcasing my commitment to meticulous work.

EPAM Systems

  • Internship Duration: 6 months.
  • Focus Areas: Cloud technologies and DevOps practices.
  • Skills Acquired: Enhanced proficiency in Agile Methods, AWS, Docker, Terraform, and other cloud and DevOps tools.
  • Experience: Gained hands-on experience and contributed to real-world projects, improving my understanding of cloud infrastructure and development practices.

πŸ“œ Blogs & Write-Ups

Explore more of my insights and analyses on cybersecurity and related topics on my Medium profile. Below are a few highlighted pieces:

  • How TryHackMe Transformed My Cybersecurity Journey - Blog
    A deep dive into learning paths, streaks, badges, and global ranking.
    Read More

  • Exploiting PHP Loose Comparison Vulnerabilities: The Magic Hash Attack(Web)
    Explore The Magic Hash Attack exploits PHP's loose comparisons, enabling attackers to bypass security checks using specific hash values.
    Read More

  • Exploiting the NAPPING 1.0.1 VulnHub Machine: A Comprehensive Guide
    The successful exploitation of the NAPPING: 1.0.1 VulnHub machine illustrates the intricacies of penetration testing Read More

For the latest and more comprehensive content, visit my Medium profile regularly for updates.

🌱 Learning & Development

I am committed to continuous improvement and staying at the forefront of cybersecurity. In the near future, I plan to focus on the following areas:

  • SOC Operations: Deepening my understanding of Security Operations Center (SOC) processes, including incident detection, analysis, and response.
  • Advanced Penetration Testing: Enhancing skills in sophisticated attack techniques and exploitation methods.
  • Cloud Security: Gaining deeper knowledge of securing cloud environments and understanding cloud security best practices.
  • DevSecOps: Integrating security practices into DevOps processes to ensure robust and secure software development.
  • Threat Intelligence: Developing expertise in gathering, analyzing, and applying threat intelligence to enhance security posture.
  • Attacking and Defending AWS: Building skills in securing and attacking Amazon Web Services (AWS) environments to better understand cloud vulnerabilities and defenses.

I am eager to apply these skills and knowledge to future projects and challenges.

🀝 Let's Connect

I'm always open to discussing cybersecurity, sharing knowledge, and collaborating on projects. Feel free to reach out to me via LinkedIn, Email, or Medium.


This portfolio is a work in progress, and I will continue to update it with new projects, skills, and certifications as I grow in my cybersecurity career.

Pinned Loading

  1. PRODIGY_CS_02 PRODIGY_CS_02 Public

    A simple image encryption tool using XOR-based pixel manipulation. Encrypt and decrypt PNG images with a user-specified key to secure image content. The tool avoids JPEG compression issues and ensu…

    Python 1

  2. PRODIGY_CS_01 PRODIGY_CS_01 Public

    Python implementation of Caesar Cipher for encryption and decryption tasks.

    Python 1

  3. PRODIGY_CS_05 PRODIGY_CS_05 Public

    A simple Python-based packet sniffer tool using Scapy for educational purposes. It captures and analyzes network packets, displaying key information like IP addresses, protocols, and payloads. Desi…

    Python

  4. PRODIGY_CS_03 PRODIGY_CS_03 Public

    A simple Password Complexity Checker tool that assesses the strength of passwords based on length, uppercase and lowercase letters, numbers, and special characters. Provides feedback on whether a p…

    Python

  5. PRODIGY_CS_04 PRODIGY_CS_04 Public

    A simple ethical keylogger built in Python, designed for educational purposes. It logs keystrokes with timestamps and saves them to a file. The keylogger includes user consent prompts and is time-l…

    Python