Skip to content
View MOBR4's full-sized avatar

Highlights

  • Pro

Block or report MOBR4

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
MOBR4/README.md

Mohamed BERKAT

Welcome to my GitHub profile! ๐Ÿ‘‹

I am Mohamed Berkat, a passionate Cybersecurity Engineering Student with hands-on experience in malware analysis, reverse engineering, and security testing. My journey in the world of cybersecurity and technology spans multiple domains, from offensive security to defensive measures, and I am constantly looking to push the boundaries of my knowledge.

I am deeply interested in topics such as Advanced Persistent Threats (APT), network security, penetration testing, and malware development, and I am excited to continue learning and contributing to the field.

๐Ÿ› ๏ธ Skills & Expertise

  • Defensive Security , SOC: SIEM solutions, ELK Stack, Wazuh and incident responseg.
  • Malware Analysis & Reverse Engineering: Static and dynamic analysis, code injection, shellcode, and exploit development.
  • Programming Languages: Python, C, Assembly, Bash, and a basic experience with embedded systems development.
  • Tools & Frameworks: Genymotion, Drozer, Android SDK, Kali Linux, Wireshark, and Metasploit.
  • Networking: SNMP, pcap files, network packet analysis.
  • DevOps: Just started learning this side of IT :).

๐Ÿ” My Projects

Here are SOME of the key projects I've been working on:

1. CyberSOC with ELK Stack and Wazuh

  • A full SIEM solution that simulates real-world attack scenarios using the ELK Stack (Elasticsearch, Logstash, Kibana) and Wazuh.
  • Key skills: Elasticsearch, Logstash, Kibana, Wazuh, threat intelligence, and incident response.

2. Malware Analysis of a Zeus Trojan

  • A comprehensive analysis of the Zeus Trojan, a notorious banking Trojan used in cybercrime.
  • Includes both static and dynamic analysis techniques to understand the Trojanโ€™s behavior, functionality, and method of infection.

3. Android Security Testing

  • A project aimed at Android security, where I used tools such as Drozer and Genymotion to identify vulnerabilities in mobile apps.
  • Focus on insecure data storage and code injection techniques.

4. Embedded Systems Security

  • Working on an embedded security project using Arduino Uno and Wokwi to simulate real-world scenarios, including temperature control and gas detection with sound and visual alerts.
  • Focus on IoT security and embedded system vulnerabilities.

๐Ÿ’ก Current Focus

I am currently exploring the following areas:

  • Ransomware Analysis: Investigating the techniques and tactics used by ransomware actors and analyzing potential defense mechanisms.
  • Exploit Development: Crafting proof-of-concept exploits and learning how to protect applications from vulnerabilities.
  • Red Teaming: Improving skills in penetration testing, vulnerability exploitation, and social engineering tactics.
  • Homelab Projects: Setting up various security testing environments and simulations to better understand network traffic analysis, web application security, and data breach prevention.
  • DevSecOps: Integrating security practices into the software development lifecycle (SDLC) by automating security tests, identifying vulnerabilities, and fostering a security-first mindset within DevOps teams.

๐Ÿ”— Find Me Elsewhere

๐Ÿ“ฌ Get in Touch

Feel free to reach out to me for any collaborations, questions, or discussions related to cybersecurity, software development, or tech in general!

You can contact me via:

Popular repositories Loading

  1. MOBR4 MOBR4 Public

    3

  2. MOBR4.github.io MOBR4.github.io Public

    JavaScript 2

  3. rootme rootme Public

    Python 2

  4. SystemeDeGestionDeTicket SystemeDeGestionDeTicket Public

    Java 1

  5. Offensive Offensive Public

    HTML 1

  6. Nightmare-Binary-exploitation- Nightmare-Binary-exploitation- Public

    1