Skip to content
View shreyasaxena725-oss's full-sized avatar

Block or report shreyasaxena725-oss

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

πŸ‘‹ Hi, I'm Shreya Saxena

πŸ”΄ Aspiring Red Team / Offensive Security Professional with a strong foundation in attack simulation, brute-force techniques, and understanding of defensive detection mechanisms.

I focus on how attacks work, how they are detected, and how attackers adapt.


🎯 Career Focus

  • Red Teaming / Penetration Testing
  • Offensive Security & Attack Simulation
  • Understanding Blue Team detection to improve evasion strategies
  • Continuous hands-on lab practice

πŸ”΄ Offensive Security Skills

  • SSH Brute-force & Credential Attacks
  • Password Spraying Concepts
  • Attack Pattern Analysis
  • Understanding Detection Thresholds
  • Red Team Reporting Mindset

πŸ›  Tools & Technologies

  • Operating Systems: Kali Linux, Linux Internals
  • Offensive Tools: Hydra, Nmap, Metasploit (learning)
  • Analysis & Visualization: Power BI, DAX, Power Query
  • Version Control: Git, GitHub
  • Protocols: SSH, TCP/IP (fundamentals)

πŸ“Œ Featured Project

πŸ” Security Incident Trend Analysis & Risk Intelligence Dashboard

  • Simulated SSH brute-force attacks using Kali Linux (Hydra)
  • Studied how failed authentication attempts are detected and classified
  • Built a Power BI dashboard to visualize attacker behavior and alert thresholds
  • Approached the project from a Red Team vs Blue Team perspective

πŸ”— Project Repository:
https://github.com/shreyasaxena725-oss/Security-Incident-Trend-Analysis


🧠 Learning Philosophy

I believe strong Red Teamers must:

  • Understand how defenders think
  • Analyze detection logic
  • Learn to adapt attacks to avoid noisy behavior
  • Document findings clearly and professionally

πŸš€ Currently Learning

  • Advanced Nmap enumeration
  • Privilege escalation (Linux)
  • Web application vulnerabilities
  • Internal network attack techniques

πŸ“« Connect With Me


⚠️ All security activities are performed in controlled lab environments for educational purposes only.

Pinned Loading

  1. Security-Incident-Trend-Analysis Security-Incident-Trend-Analysis Public

    SOC-style dashboard for SSH brute-force detection using Power BI and Kali Linux

  2. DVWA-Vulnerability-assessment-kali DVWA-Vulnerability-assessment-kali Public

    "DVWA Vulnerability Assessment & Exploitation using Kali Linux β€” SQL Injection, Command Injection, File Upload RCE, and Web Security Testing."

  3. Brute-force-detection Brute-force-detection Public

    Conducted a comprehensive security assessment and response for a CentOS VM under brute force attack, focusing on log analysis, user verification, and implementation of enhanced security measures to…

    Shell

  4. enterprise-recon-automation enterprise-recon-automation Public

    Automated enterprise reconnaissance & pentest automation framework

    HTML