Skip to content
View prakharvr02's full-sized avatar
  • New Delhi

Block or report prakharvr02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
prakharvr02/README.md

πŸ§‘β€πŸ’» Prakhar Verma

Security Operations Analyst | Threat Intelligence Enthusiast
πŸ“ India | 🌐 CEH Certified | πŸ’Ό Blue Team Specialist


πŸš€ About Me

Hi there! I'm Prakhar, a security analyst with a hacker's mindset and a defender's heart.

I specialize in threat detection, incident response, and malware analysis. My work focuses on automating SOC processes and building threat-aware detection rules mapped to MITRE ATT&CK.

πŸ”­ I’m currently working on:

  • Building a custom Threat Intel pipeline using OTX + MISP
  • Enhancing my malware analysis lab with dynamic capabilities
  • Practicing SOC playbooks with LetsDefend and TryHackMe labs

🧩 Featured Projects

A complete end-to-end automated detection and response setup using:

  • πŸ’» Windows + Sysmon logs
  • πŸ›‘οΈ Wazuh + TheHive
  • βš™οΈ Shuffle SOAR workflows
  • πŸ”¬ VirusTotal enrichment

πŸš€ Real-time alert triage, IOC correlation, and auto case creation.


Reverse-engineering setup with FLARE VM:

  • 🧠 PE analysis, string extraction, obfuscation detection
  • πŸ› οΈ Tools used: PEStudio, FLOSS, XORSearch, UPX
  • πŸ“„ Documented each sample for repeatability

  • 🧩 Wrote 150+ Sigma rules mapped to ATT&CK
  • πŸ“Š Built visual dashboards for detection insights
  • πŸ” Automated IOC lookup & case escalation

πŸ› οΈ My Toolbox

Category Tools Used
🧠 SIEM & Monitoring Splunk, ELK Stack, Microsoft Sentinel
πŸ›‘οΈ Threat Intel MISP, OTX, AbuseIPDB
πŸ” Malware Analysis FLARE VM, Ghidra, IDA Pro, CAPE, YARA
πŸ–₯️ Endpoint Security Sysmon, Defender ATP, CrowdStrike
🧰 SOAR & Case Mgmt Shuffle, TheHive
πŸ§‘β€πŸ’» Scripting Python, PowerShell, Bash

πŸ“š Certifications & Training

  • βœ… CEH – Certified Ethical Hacker
  • βœ… Blue Team Labs – LetsDefend (SIEM, Malware, IR, Threat Hunting)
  • βœ… TryHackMe – Ongoing labs for Red + Blue side knowledge

πŸ“« Let's Connect


Thanks for visiting! If you're a recruiter, collaborator, or fellow cyber geek β€” let's team up and defend the digital world together. πŸ›‘οΈπŸ’»

Popular repositories Loading

  1. SOC-Automation SOC-Automation Public

    Built a complete SIEM + DFIR homelab using Wazuh, TheHive, Cortex, Arkime & MISP. Setup guide on GitHub.

    1

  2. Static-Malware-Analysis-Homelab Static-Malware-Analysis-Homelab Public

    Performed deep static analysis using tools like HxD, Cmder, HashCalc, BinText, XorSearch, FLOSS, UPX, and PEStudio to extract strings, identify file structure, detect obfuscation, and reveal indica…

  3. Dynamic-Malware-Analysis-Homelab Dynamic-Malware-Analysis-Homelab Public

    Dynamic malware analysis homelab setup using virtualization, monitoring, and debugging tools to observe and understand malware behavior safely.

  4. Phishing-Analysis Phishing-Analysis Public

    Analyzed a real phishing email using Thunderbird, Sublime Text, and CyberChef. Investigated headers, decoded base64, extracted URLs, and identified impersonation to build practical SOC-level phishi…

  5. Splunk-Cyberdefender-Project Splunk-Cyberdefender-Project Public

    Splunk BOTSv3 lab visual reference for SOC analysts and learners. Useful for understanding real-world threat detection using SIEM. Enhance your investigation skills with real attack data.

  6. PCAP-Analyzing-Lab-Blue-Team-Project PCAP-Analyzing-Lab-Blue-Team-Project Public

    A complete PCAP analysis lab project for blue teamers to detect, investigate, and document network threats using real-world attack scenarios.