🔐 Cybersecurity enthusiast focused on Application Security, Cloud Security, Red Teaming and Threat Detection
🎓 Computer Science Engineer from University Institute of Technology, Burdwan
☁️ Experienced in AWS Security Architecture, Cloud Monitoring and Security Automation
🛡️ Skilled in Web Security Testing, Bug Bounty Hunting, SOC Monitoring and Network Security
💡 I build tools and labs to simulate real-world cyber attacks and defenses
🎯 Career Goal: Security Engineer
🔗 https://github.com/Himangshu30/AI-Driven-DDoS-Defense-Smarter-Network-Protection
- ML-based anomaly detection
- Real-time network traffic monitoring
- AWS-based mitigation architecture
🔗 https://github.com/Himangshu30/AWS-S3-Bucket-s-and-Object-s-Enumaration-using-Lambda
- Detect exposed S3 buckets
- Automated cloud misconfiguration detection
- Serverless security automation
🔗 https://github.com/Himangshu30/jwt-honeypot-system
- Detect malicious token usage
- Track attacker behavior
- API security research
🔗 https://github.com/Himangshu30/BackDoor-Framework-for-Reverse-Shell
- Offensive security framework
- Remote command execution
- Red team simulation
Architecture
Attacker → Victim → Zeek → Splunk → Detection Dashboard
- Containerized SOC lab
- Network threat monitoring
- Traffic analysis pipeline
- Application Security Testing
- Cloud Security (AWS)
- Bug Bounty Hunting
- Red Teaming
- Blue Teaming
- Threat Detection
- Security Automation
- Network Security
- Web Exploitation
## Application Security Tools
Tools
- Burp Suite
- OWASP ZAP
- ffuf
- sqlmap
- nuclei
- katana
Tools
- Nmap
- tcpdump
- Wireshark
- Zeek
- Suricata
Services
- AWS IAM
- AWS WAF
- AWS Shield
- AWS CloudWatch
- S3 Security Monitoring
- Lambda Security Automation
Tools
- Splunk
- ELK Stack
- Zeek
- Log Analysis
- Threat Detection
⭐ If you like my work, consider starring my repositories