Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content
View Haroonkhan525's full-sized avatar
🌏
Full Time
🌏
Full Time

Block or report Haroonkhan525

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Haroonkhan525/README.md
  • πŸ‘‹ Hi, I’m currently serving as Cybersecurity Analyst while in the past, I have served as Cybersecurity Researcher
  • πŸ‘€ I’m interested in solving cybersecurity challenges (LetsDefend, Trhyhackme, HacktheBox).
  • 🌱 I’m a CTF player, who participated in a recent national cybersecurity Hackathon held in December 2023. Our team 4G3NCY was on 2nd in the top three qualifiers.
  • πŸ“ I regularly write articles on Medium https://medium.com/@haroon00525
  • πŸ’žοΈ You can ask me about, SIEM configurations, Malware analysis (Windows, Office Documents files), and Cyber Deception.
  • πŸ“« Expanding my cybersecurity skillset with advanced threat-hunting methodologies, in-depth SIEM analysis, and recognized cybersecurity certifications & courses.

Pinned Loading

  1. FunctionFlow-MALAPI-Sequencer FunctionFlow-MALAPI-Sequencer Public

    ## FunctionFlow-MALAPI-Sequencer: Unmask Malicious Intent from Dynamic Execution Flow

    Shell