Coder Social home page Coder Social logo

maharkk / calculator Goto Github PK

View Code? Open in Web Editor NEW
0.0 0.0 0.0 53 KB

This is a basic calculator app built with HTML, CSS, and JavaScript. It allows the user to perform basic arithmetic operations such as addition, subtraction, multiplication, and division. The app features both light and dark mode themes with corresponding icons. The design is responsive and can be used on desktop and mobile devices.

HTML 29.63% JavaScript 28.83% CSS 41.54%

calculator's Introduction

πŸ‘¨β€πŸ’» Mahar Hassain K K - Cybersecurity Professional

Welcome to my GitHub portfolio! I'm a passionate cybersecurity professional with a strong background in security operations, penetration testing, and SOC analysis. My journey in cybersecurity is driven by a continuous thirst for knowledge and a dedication to making the digital world a safer place. With hands-on experience in tools like Burp Suite, Splunk, and various vulnerability assessment platforms, I'm committed to finding and mitigating threats. Ranked in the top 5% on TryHackMe, I aim to contribute to meaningful cybersecurity projects and share knowledge with the community.

"This portfolio is a work in progress, and I will continue to update it with new projects, skills, and certifications as I grow in my cybersecurity career."

πŸ” About Me

  • Name: Mahar Hassain K K
  • Role: Cybersecurity Professional | SOC Analyst | Penetration Tester
  • Experience: 1 years in Cybersecurity
  • Location: Kerala, India
  • Specializations: VAPT β€’ Security Operations β€’ Threat Hunting β€’ Incident Response β€’ Network Security
  • Email: [email protected]
  • LinkedIn: Maharkk
  • Medium Blog/Writeups: Maharkk
  • Current Focus: Working on enhancing my skills in penetration testing, with a strong passion for securing digital environments.

Education πŸŽ“

B.Tech in Computer Science (Honors), Major: Cybersecurity
Lovely Professional University, Punjab, India
Graduated: 2023
CGPA: 7.41 / 10

Experience πŸ’Ό

Cybersecurity Trainee: Penetration Testing & SOC Analyst
Red Team Hacker Academy, Kerala, India
Duration: 6 months

  • Gained hands-on experience in security operations, monitoring, incident response, and penetration testing.
  • Conducted vulnerability assessments and simulated attacks to evaluate system security.
  • Worked with various tools and techniques for threat detection, analysis, and ethical hacking.

Cybersecurity Intern
Prodigy InfoTech (Remote)
Duration: 1 months

  • Working on practical cybersecurity projects, including encryption tools, password complexity checkers, keyloggers, and network packet analyzers.
  • Gaining hands-on experience in encryption techniques, network security, and ethical hacking.
  • Contributing to the development of security tools and techniques for real-world application.

πŸ† TryHackMe

image

πŸ†= Rank πŸšͺ= Rooms Completed 🎯= Badges Earned

πŸ…Notable Badges Acquired

TryHackMe Streak Badge 90 Day Streak TryHackMe OWASP Badge Owasp Top 10 TryHackMe Mr. Robot Badge Mr. Robot TryHackMe Linuxpriesc Badge Linuxpriesc TryHackMe Hash Cracker Badge Hash Cracker

πŸ› οΈ Skills

πŸ” Cybersecurity Skills

  • Penetration Testing: Proficient in Metasploit Framework, Burp Suite, Nmap, Wireshark, and John the Ripper.
  • Vulnerability Assessment: Experienced with tools such as OpenVAS, Nessus, WPScan, and Arachni.
  • Threat Hunting: Skilled in techniques and tools like Splunk, Yara, and Sysmon.
  • Incident Response: Hands-on experience with incident handling, response strategies, and recovery processes.
  • Security Operations: Expertise in SIEM, SOC monitoring, log analysis, Snort, and security automation.

πŸ’» Programming & Scripting

  • Languages:
    • Python: Automation, scripting, and development of security tools.
    • Bash: Scripting in Unix/Linux environments and automation tasks.
    • PowerShell: Windows system administration and scripting.
    • JavaScript: Web application security assessments.
    • SQL: Database querying and security testing.

πŸ–₯️ Operating Systems

  • Windows: Extensive experience with various versions for penetration testing, incident response, and system administration.
  • Linux: Proficient in distributions such as Kali Linux, Parrot, and Ubuntu for security assessments, scripting, and server management.

πŸ—‚οΈ Projects

1. Network Packet Analyzer

  • Description:
  • Tools Used:
  • GitHub Repo:

2. Password Complexity Checker

  • Description:
  • Tools Used:
  • GitHub Repo:

3. Pixel Manipulation for Image Encryption

  • Description: [Brief description of the project and its significance]
  • Tools Used: [List of tools used in the project]
  • GitHub Repo: [Link to the GitHub repository]

4. Simple Keylogger

  • Description:
  • Tools Used:
  • GitHub Repo:

πŸŽ“ Certifications

  • Learn Ethical Hacking From Scratch 2024

  • SOC Level 1 - On Process

    • TryHackMe - 2024
    • Certificate
  • Jr Penetration Tester - On Process

    • TryHackMe - 2024
    • Certificate
  • Certified IT Infrastructure and Cyber SOC Analyst V3 (CICSA) - on process

    • Red Team Hacker Academy - 2024
    • Certificate

πŸ† Achievements

Top 5% on TryHackMe

  • Rank: Achieved a position in the top 5% of users globally.
  • Level: Currently at Level 8: Hacker, working towards the next level, Omni.
  • Highlights: Successfully completed various learning paths, maintained a consistent streak for over three months, and earned numerous badges for achievements and milestones. TryHackMe's hands-on challenges have been pivotal in advancing my cybersecurity skills.

UHRS (Universal Human Relevance System)

  • Tasks Completed: Over 5,000 tasks.
  • Skills Demonstrated: Data analysis, security, and attention to detail.
  • Recognition: Received incentives for the successful completion of bug bounties and data labeling tasks, showcasing my commitment to meticulous work.

EPAM Systems

  • Internship Duration: 6 months.
  • Focus Areas: Cloud technologies and DevOps practices.
  • Skills Acquired: Enhanced proficiency in Agile Methods, AWS, Docker, Terraform, and other cloud and DevOps tools.
  • Experience: Gained hands-on experience and contributed to real-world projects, improving my understanding of cloud infrastructure and development practices.

TCS NQT (National Qualifier Test)

  • Conducted By: Tata Consultancy Services (TCS).
  • Assessment Areas: Quantitative and verbal abilities, programming logic, and coding skills.
  • Score: 1262.58/1800 (70.14%).
  • Overview: The TCS NQT provides a comprehensive evaluation for candidates, testing their skills and potential in various areas relevant to the tech industry.

πŸ“œ Blogs & Write-Ups

Explore more of my insights and analyses on cybersecurity and related topics on my Medium profile. Below are a few highlighted pieces:

  • How TryHackMe Transformed My Cybersecurity Journey - Blog
    A deep dive into learning paths, streaks, badges, and global ranking.
    Read More

  • Unmasking Cyber Threats: Phishing, DoS Attacks, and AndroidΒ RATs - Blog
    Explore real-world examples of phishing, DoS attacks, and Android RATs to understand how cyber threats operate and learn essential tips for staying safe online.
    Read More link needs to be updated...

  • Privilege Escalation - Write-up
    Exploring Reverse and Bind Shells with Netcat and Socat.
    Read More

  • Penetration Testing Fundamentals - Write-up
    Navigating the Ethics and Methodologies of Penetration Testing.
    Read More

For the latest and more comprehensive content, visit my Medium profile regularly for updates.

🌱 Learning & Development

I am committed to continuous improvement and staying at the forefront of cybersecurity. In the near future, I plan to focus on the following areas:

  • Advanced Penetration Testing: Enhancing skills in sophisticated attack techniques and exploitation methods.
  • Cloud Security: Gaining deeper knowledge of securing cloud environments and understanding cloud security best practices.
  • DevSecOps: Integrating security practices into DevOps processes to ensure robust and secure software development.
  • Threat Intelligence: Developing expertise in gathering, analyzing, and applying threat intelligence to enhance security posture.
  • Attacking and Defending AWS: Building skills in securing and attacking Amazon Web Services (AWS) environments to better understand cloud vulnerabilities and defenses.

I am eager to apply these skills and knowledge to future projects and challenges.

🀝 Let's Connect

I'm always open to discussing cybersecurity, sharing knowledge, and collaborating on projects. Feel free to reach out to me via LinkedIn, Email, or Medium.


This portfolio is a work in progress, and I will continue to update it with new projects, skills, and certifications as I grow in my cybersecurity career.

calculator's People

Contributors

maharkk avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.