Skip to content
View Himangshu30's full-sized avatar

Block or report Himangshu30

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Himangshu30/README.md

Hi 👋, I'm Himangshu Sarkar

Cybersecurity Engineer | Cloud Security | Red Team | Detection Engineering


👨‍💻 About Me

🔐 Cybersecurity enthusiast focused on Application Security, Cloud Security, Red Teaming and Threat Detection

🎓 Computer Science Engineer from University Institute of Technology, Burdwan

☁️ Experienced in AWS Security Architecture, Cloud Monitoring and Security Automation

🛡️ Skilled in Web Security Testing, Bug Bounty Hunting, SOC Monitoring and Network Security

💡 I build tools and labs to simulate real-world cyber attacks and defenses

🎯 Career Goal: Security Engineer


🚀 Featured Cybersecurity Projects

🛡 AI-Driven DDoS Defense

🔗 https://github.com/Himangshu30/AI-Driven-DDoS-Defense-Smarter-Network-Protection

  • ML-based anomaly detection
  • Real-time network traffic monitoring
  • AWS-based mitigation architecture

☁️ AWS S3 Enumeration using Lambda

🔗 https://github.com/Himangshu30/AWS-S3-Bucket-s-and-Object-s-Enumaration-using-Lambda

  • Detect exposed S3 buckets
  • Automated cloud misconfiguration detection
  • Serverless security automation

🍯 JWT Honeypot System

🔗 https://github.com/Himangshu30/jwt-honeypot-system

  • Detect malicious token usage
  • Track attacker behavior
  • API security research

🔥 Reverse Shell Backdoor Framework

🔗 https://github.com/Himangshu30/BackDoor-Framework-for-Reverse-Shell

  • Offensive security framework
  • Remote command execution
  • Red team simulation

🌐 Docker Based Network Traffic Analyzer

Architecture

Attacker → Victim → Zeek → Splunk → Detection Dashboard
  • Containerized SOC lab
  • Network threat monitoring
  • Traffic analysis pipeline

🧠 Cybersecurity Skills

  • Application Security Testing
  • Cloud Security (AWS)
  • Bug Bounty Hunting
  • Red Teaming
  • Blue Teaming
  • Threat Detection
  • Security Automation
  • Network Security
  • Web Exploitation

💻 Programming Languages


🔐 Application Security Tools

## Application Security Tools

BurpSuite OWASP SQLMap Nuclei FFUF

Tools

  • Burp Suite
  • OWASP ZAP
  • ffuf
  • sqlmap
  • nuclei
  • katana

🌐 Network Security Tools

Tools

  • Nmap
  • tcpdump
  • Wireshark
  • Zeek
  • Suricata

☁️ Cloud Security

Services

  • AWS IAM
  • AWS WAF
  • AWS Shield
  • AWS CloudWatch
  • S3 Security Monitoring
  • Lambda Security Automation

🛡 SOC / Detection Tools

Tools

  • Splunk
  • ELK Stack
  • Zeek
  • Log Analysis
  • Threat Detection

🐳 DevOps & Infrastructure


📊 GitHub Stats


📈 Contribution Graph


📫 Connect With Me


⭐ If you like my work, consider starring my repositories

Pinned Loading

  1. AWS-S3-Bucket-s-and-Object-s-Enumaration-using-Lambda AWS-S3-Bucket-s-and-Object-s-Enumaration-using-Lambda Public

    Python

  2. AWS-Security-Automation AWS-Security-Automation Public

    HCL

  3. BackDoor-Framework-for-Reverse-Shell BackDoor-Framework-for-Reverse-Shell Public

    Python

  4. SERVER-SIDE-TEMPLATE-INJECTION-PAYLOADS SERVER-SIDE-TEMPLATE-INJECTION-PAYLOADS Public

  5. xss-finder xss-finder Public

    XSS FINDER

    Shell