Skip to content
View soheilsheikh's full-sized avatar
πŸ•΅οΈβ€β™‚οΈ
Hunting Viruses & Eliminating Threats!
πŸ•΅οΈβ€β™‚οΈ
Hunting Viruses & Eliminating Threats!
  • Mumbai, India
  • 04:33 (UTC +05:30)

Organizations

@zero-to-mastery

Block or report soheilsheikh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
soheilsheikh/README.md

Cybersecurity Professional

πŸ’« About Me:

πŸ”­ I’m currently working on
Cybersecurity analysis with a focus on threat intelligence and security operations.

πŸ§‘β€πŸ€β€πŸ§‘ I’m looking to collaborate on
Projects that strengthen digital defenses and improve incident response strategies.

🀝 I’m looking for help with
Expanding community-driven intelligence sharing and advanced malware analysis techniques.

🌱 I’m currently learning
Emerging threat actor tactics and evolving malware trends to stay ahead of adversaries.

πŸ’¬ Ask me about
Threat intelligence, malware analysis, and tracking cybercriminal activity.

⚑ Fun fact
I enjoy turning complex threat data into actionable insights that help protect organizations worldwide.

🌐 Socials:

LinkedIn email

πŸ’» Tech Stack:

HTML5 Markdown Python Rust Bash Script CSS3 R MySQL AWS Google Cloud Elasticsearch MySQL SQLite Pandas NumPy Matplotlib PyTorch Scipy TensorFlow GitHub Git Bitwarden Cisco ElasticSearch Docker Raspberry Pi TOR

πŸ“Š GitHub Stats:



✍️ Random Dev Quote

πŸ›‘οΈ Skills

  • Threat Intelligence: Malware analysis, IOC identification, threat actor tracking
  • Security Operations: SIEM implementation, alert triage, incident response
  • Tools: Wireshark, Splunk, ELK Stack, Metasploit, Burp Suite, Nmap
  • Defensive Security: Vulnerability assessment, penetration testing, security hardening
  • Programming: Python, Bash scripting, PowerShell

πŸŽ“ Certifications

  • Google Cybersecurity Professional Certificate
  • Cisco Certified Ethical Hacker
  • Cisco Certified Jr. Cyber Analyst

πŸ“Š Projects & Contributions

  • Trivy Web Scanner: User-friendly web interface for Trivy vulnerability scanner, providing dashboard for scan management and vulnerability visualization for containers, filesystems, and Git repositories.
  • Active contributor on VirusTotal, sharing threat intelligence findings
  • Honeypot Implementation for Threat Intelligence: Hosted a Honeypot System using TPot Honeypot Framework on Cloud running a Debian 12 OS.

Pinned Loading

  1. Trivy_WebUI Trivy_WebUI Public

    A lightweight, intuitive web interface for Trivy, the comprehensive vulnerability scanner for containers, filesystems, and Git repositories. This application provides a user-friendly dashboard to m…

    HTML 1

  2. tpotce tpotce Public

    Forked from telekom-security/tpotce

    🍯 T-Pot - The All In One Multi Honeypot Platform 🐝

    C

  3. PRODIGY_CS_01 PRODIGY_CS_01 Public

    A Python program that can encrypt and decrypt plaintext using the Caesar Cipher algorithm.

    Python

  4. PRODIGY_CS_02 PRODIGY_CS_02 Public

    Image encryption using XOR method

    Python

  5. PRODIGY_CS_03 PRODIGY_CS_03 Public

    Python Program to measure the strength of a Password.

    Python

  6. soheilsheikh soheilsheikh Public