Welcome to my GitHub profile! ๐
I am Mohamed Berkat, a passionate Cybersecurity Engineering Student with hands-on experience in malware analysis, reverse engineering, and security testing. My journey in the world of cybersecurity and technology spans multiple domains, from offensive security to defensive measures, and I am constantly looking to push the boundaries of my knowledge.
I am deeply interested in topics such as Advanced Persistent Threats (APT), network security, penetration testing, and malware development, and I am excited to continue learning and contributing to the field.
- Defensive Security , SOC: SIEM solutions, ELK Stack, Wazuh and incident responseg.
- Malware Analysis & Reverse Engineering: Static and dynamic analysis, code injection, shellcode, and exploit development.
- Programming Languages: Python, C, Assembly, Bash, and a basic experience with embedded systems development.
- Tools & Frameworks: Genymotion, Drozer, Android SDK, Kali Linux, Wireshark, and Metasploit.
- Networking: SNMP, pcap files, network packet analysis.
- DevOps: Just started learning this side of IT :).
Here are SOME of the key projects I've been working on:
- A full SIEM solution that simulates real-world attack scenarios using the ELK Stack (Elasticsearch, Logstash, Kibana) and Wazuh.
- Key skills: Elasticsearch, Logstash, Kibana, Wazuh, threat intelligence, and incident response.
- A comprehensive analysis of the Zeus Trojan, a notorious banking Trojan used in cybercrime.
- Includes both static and dynamic analysis techniques to understand the Trojanโs behavior, functionality, and method of infection.
- A project aimed at Android security, where I used tools such as Drozer and Genymotion to identify vulnerabilities in mobile apps.
- Focus on insecure data storage and code injection techniques.
- Working on an embedded security project using Arduino Uno and Wokwi to simulate real-world scenarios, including temperature control and gas detection with sound and visual alerts.
- Focus on IoT security and embedded system vulnerabilities.
I am currently exploring the following areas:
- Ransomware Analysis: Investigating the techniques and tactics used by ransomware actors and analyzing potential defense mechanisms.
- Exploit Development: Crafting proof-of-concept exploits and learning how to protect applications from vulnerabilities.
- Red Teaming: Improving skills in penetration testing, vulnerability exploitation, and social engineering tactics.
- Homelab Projects: Setting up various security testing environments and simulations to better understand network traffic analysis, web application security, and data breach prevention.
- DevSecOps: Integrating security practices into the software development lifecycle (SDLC) by automating security tests, identifying vulnerabilities, and fostering a security-first mindset within DevOps teams.
- LinkedIn: LinkedIn Profile
- Blog: My Cybersecurity Blog
- Portfolio: Visit My Full Portfolio
Feel free to reach out to me for any collaborations, questions, or discussions related to cybersecurity, software development, or tech in general!
You can contact me via:
- Email: [email protected] Thank you for visiting my GitHub! ๐