Skip to content
View airgirl2305's full-sized avatar

Block or report airgirl2305

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
airgirl2305/README.md

Hi there, I'm Kheda! 🖖🏻

Aspiring SOC Analyst | DFIR Enthusiast**

CFO transitioning into cybersecurity through intensive hands-on training. Building a foundation in threat detection, log analysis, and incident response. This space is for future DFIR case studies, security tool experiments, and contributions to open-source security projects.

Current Focus: Completing a 270-hour SOC Analyst track, mastering 35+ attack techniques (from web app exploits to Active Directory compromise) through hands-on labs with Wireshark, Splunk, ELK, and modern threat hunting methodologies. View my learning profile

🛡️ Cybersecurity Tools & Technologies I'm Working With:

OS & Environments: Windows | Linux (Kali, Ubuntu) | Virtualization SIEM & Analytics: Splunk | Elastic Stack (ELK) | Microsoft Sentinel | Microsoft 365 Defender
Network Security Analysis: Wireshark | Nmap | Suricata
Digital Forensics & Incident Response (DFIR): Autopsy | FTK Imager | Volatility | Sysinternals Suite
Scripting & Automation: Python | PowerShell | Bash | JavaScript | Frameworks & Standards: MITRE ATT&CK | Cyber Kill Chain | NIST CSF


📂 Security Projects & Analysis

Currently mastering hands-on SOC analysis through intensive training. This space is for future case studies and tools.

A practical, growing collection of security operations resources:

  • /network-attacks-detection – 19 techniques: scanning, web attacks (SQLi, XSS, CSRF), wireless attacks, and malicious traffic analysis.
  • /endpoint-attacks-detection – 11 techniques: Windows/Linux process anomalies, vulnerability exploitation, SAM/LSASS attacks, and persistence mechanisms.
  • /active-directory-attacks-detection – 10 techniques: AD reconnaissance, Kerberos attacks, Pass-the-Hash/Ticket, DCSync, and certificate service abuse.

--

🌐 Connect With Me

website website   Email


Pinned Loading

  1. security-automation-scripts security-automation-scripts Public

  2. ACTIVE_DIRECTORY_ATTACKS_DETECTION ACTIVE_DIRECTORY_ATTACKS_DETECTION Public

  3. ATTACK_TECHNIQUES ATTACK_TECHNIQUES Public

  4. ENDPOINT_ATTACKS_DETECTION ENDPOINT_ATTACKS_DETECTION Public

  5. NETWORK_TRAFFIC_ATTACS_DETECTION NETWORK_TRAFFIC_ATTACS_DETECTION Public

    The reconnaissance phase is a critical stage of the cyber kill chain, where attackers explore and map the target infrastructure. During internal reconnaissance, adversaries gather information about…