Skip to content
View hamsycodes's full-sized avatar
🧩
Researching
🧩
Researching

Block or report hamsycodes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hamsycodes/README.md

Hi I'm Humza! Aspiring Security Analyst and Researcher 🖥️

I am final year student CS Major. I am a Blue Teamer who spends most of his time researching about security related domains and working on new projects. Here i have some repos published that shows my work in the evolving cyber field.

Humza GitHub stats

Pinned Loading

  1. CyberPython-Projects CyberPython-Projects Public

    These are some of the cyber projects I worked on. All of them are coded in Python Language. It involves some beginner projects including keyloggers, ping and port scanners, messageEncryptors, passw…

    Python

  2. ElasticSearch-using-Kali ElasticSearch-using-Kali Public

    A step-by-step guide for setting up an SIEM using the Elastic Web Portal and a Kali Linux VM. You will learn how to generate security events on the Kali VM, set up an agent to forward data to the S…

  3. ElasticSearch-using-Sysmon ElasticSearch-using-Sysmon Public

    A step-by-step guide for setting up an SIEM using the Elastic Web Portal and Sysmon. You will learn how to generate security events on the windows machine, set up Sysmon on your windows machine. Ge…

  4. VulnerabilityManagement-using-Nessus-Essentials- VulnerabilityManagement-using-Nessus-Essentials- Public

    A guide for accessing vulnerabilities. You will access vulnerabilities using a Windows 10 VM, set up Nessus Essentials on your system, run multiple scans carrying out various tasks including (insta…

    1

  5. RansomwarePython-PoC RansomwarePython-PoC Public

    This is a Ransomware Simulation in Python. It encrypts and decrypts the data (i.e. either a txt or png file) using a predefined key. If there is no key, encryption and decryption cannot be performed.

    Python