Skip to content
View Ghost-7A's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Ghost-7A

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Ghost-7A/README.md

Hello, I'm Zawwad Ahmed

My enthusiasm for technology fuels my ability to navigate and solve challenging problems.

Objective

Through my experience in computer science, I’ve discovered a passion for cybersecurity and I am now eager to transition into this field, specifically aiming to join a Security Operations Center (SOC) as a Tier 1 Analyst.

Discord logo

Skills

Skill Associated Project
SIEM Implementation and Log Analysis Attack-Technique-Emulation-Wazuh
Setup Wazuh on Docker Wazuh Docker Deployment

Tools

Network

Wireshark logo
Wireshark
Suricata logo
Suricata
Snort logo
Snort

Endpoint (EDR)

Wazuh logo
Wazuh

SIEM

Elastic logo
Elastic
Splunk logo
Splunk
Wazuh logo
Wazuh

Threat Intelligence Platform (TIP)

OpenCTI logo
OpenCTI

Cloud and Platform Tools

Docker logo
Docker

Operating Systems

Kali Linux logo
Kali Linux
Ubuntu logo
Ubuntu
Windows logo
Windows

Database

MySQL logo
MySQL

Some Other Tools

Nessus logo
Nessus
ZAP logo
OWASP ZAP
Burp Suite logo
Burp Suite
Metasploit logo
Metasploit
Nuclei logo
Nuclei

Certifications

Projects

Pinned Loading

  1. wazuh-docker-deployment wazuh-docker-deployment Public

    Effortlessly deploy Wazuh in a single-node Docker setup for streamlined security monitoring and threat detection.

  2. Attack-Technique-Emulation-Wazuh Attack-Technique-Emulation-Wazuh Public

    A project showcasing attack technique emulation using MITRE ATT&CK and detection with Wazuh, Sysmon, and Atomic Red Team.