Skip to content
View PrajeetGuha's full-sized avatar
πŸ˜€
Working
πŸ˜€
Working

Block or report PrajeetGuha

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
PrajeetGuha/README.md

πŸ‘‹ Hey, cyber folks!

I'm Prajeet Guha β€” your friendly neighborhood Blue Teamer who loves rolling up sleeves, diving into logs, and keeping the bad guys on their toes! πŸ˜„πŸ›‘οΈ

By day, I’m wrangling logs and chasing alerts. By night, I’m sneaking a peek at Red Team tricks to level up my defense game (because who says defenders can’t think like attackers too? 😏).


πŸ’» What I Jam On (a.k.a. my Cybersecurity Playground)

  • πŸ“Š SIEMs I vibe with: ArcSight, Splunk, ELK β€” if it spits logs, I’m watching it!
  • πŸ›‘οΈ EDR/XDR Guardians: Crowdstrike, Cortex XDR, SentinelOne
  • πŸ”Ž Threat Hunting & IR: Alerts, incidents, chaos β€” I’m in!
  • πŸ‘€ Log Parsing & Monitoring: Yes, I actually enjoy staring at logs (weird flex, but okay)
  • 🧰 Defender Magic: MDO, MDI, MDE, plus all the good Microsoft stuff
  • 🧬 Malware Analysis & Reverse Engineering: Breaking down the baddies πŸ›πŸ”
  • ☁️ Cloud Security Stuff: AWS & Azure β€” keeping the skies clear
  • πŸ§ͺ Fun Tools: Halcyon, Darktrace, Wireshark

πŸŽ’ Skills That Keep Me Grooving

  • πŸ’¬ Talking tech with humans β€” I can explain logs and make it fun
  • πŸ‘¨β€πŸ’» Programming Side Quests: Java, Python, PowerShell, C
  • πŸ“¦ Virtual Environments: VMware, VirtualBox, Hyper-V (my lab is chaos in the best way)
  • 🧾 Case Management: Jira, ServiceNow β€” where the ticket magic happens ✨

πŸ… Certs & Learning Adventures

  • βœ… Got my Security+ badge β€” my golden ticket into the crazy world of cybersecurity
  • 🧠 On the hunt for CEH β€” mastering the art of sneaky (but totally ethical) hacker moves
  • πŸ–₯️ Geeking out over Windows Internals β€” gotta know what makes the OS tick!
  • πŸ› Diving deep into Malware Analysis β€” chasing bugs and bad code like a cyber detective
  • πŸ”Ž Playing detective with Forensics β€” piecing together digital mysteries, one clue at a time
  • πŸ“š Always curious, always learning β€” there’s a new rabbit hole waiting to be explored! πŸ‡

πŸ” β€œCybersecurity is like being a wizard… but instead of spells, you cast scripts and block malicious actors.” πŸ§™β€β™‚οΈβœ¨

πŸ“ Blog Posts

Here’s where I share my thoughts, stories, and lessons learned from the trenches of cybersecurity β€” logs, tools, attacks, and all that good stuff:

Knowledge Blogs

CTF WriteUps

Simulation Lab Build Guides

✨ More to come soon...

🀝 Project Contributions & Collaborations

I love rolling up my sleeves and jumping into projects that make a difference β€” whether it’s fixing bugs, adding new features, or improving security postures. Here’s how I contribute:

  • 🐞 Bug hunting and fixing: Squashing pesky bugs and making code cleaner and safer.
  • πŸš€ Feature building: Adding cool new capabilities to tools and dashboards that help teams work smarter.
  • 🀝 Collaboration: Working with diverse teams, sharing knowledge, and learning from others to grow stronger together.
  • πŸ“š Documentation: Writing clear guides and docs so everyone can get onboarded faster and use tools effectively.

Every PR and commit is a chance to learn something new and help the community β€” that’s what makes this journey so exciting! πŸŽ‰

πŸš€ Top Repositories I’ve Contributed To

  • πŸ–₯️ VM-Packages - A collection of easily installable tools and modules, used for installing packages in popular FlareVM and CommandoVM.

Got a favorite repo or project? Ping me β€” I love talking code and collaboration!


πŸ“ˆ GitHub Activity & Stats

YourName's GitHub Stats

πŸ›‘οΈ Global Vulnerability Intelligence Platform (GVIP)

I’m excited to be part of the ongoing discussions and planning for the Global Vulnerability Intelligence Platform (GVIP) under OWASP, where we’re working hard to find better ways to tackle CVE shortcomings.

Our goal? To create smarter, federated systems that improve how vulnerability info is shared across communities and tools β€” making the cybersecurity ecosystem faster, stronger, and more connected.

Being part of this effort means diving into threat modeling, collaborating with global experts, and helping build the future of vulnerability intelligence! πŸŒπŸ”πŸš€

πŸŽ‰ Wanna Know More? Check These Out!

Get the scoop on all things GVIP and join the fun with the awesome community powering vulnerability intelligence:

LinkedIn GitHub OWASP Blog

🎯 CTFs & Learning Playground

I love sharpening my skills through Capture The Flag (CTF) challenges and hands-on platforms like TryHackMe β€” because practice makes perfect (and fun)!

Check out my TryHackMe score:

TryHackMe Badge

Pinned Loading

  1. flare-vm flare-vm Public

    Forked from mandiant/flare-vm

    A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

    PowerShell

  2. VM-Packages VM-Packages Public

    Forked from mandiant/VM-Packages

    Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.

    PowerShell