Skip to content
View ianiketkumar7's full-sized avatar
🪖
🪖

Block or report ianiketkumar7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ianiketkumar7/README.md

   

🛡️ aniket@kali:~$ cat about_me.txt

  >> 🔭  Exploring   Threat Detection, Malware Analysis, and Security Operations
  >> 🌱  Learning    Cybersecurity, Network Security & Red Hat Linux Administration
  >> 👯  Open To     Cybersecurity Research & Security Projects
  >> 💬  Ask About   Linux, Shell Scripting & Security Fundamentals
  >> 📫  Contact     aniketkumar.nikeman@gmail.com
  >> ⚡  Identity    NCC Cadet — Discipline | Leadership | Strategic Thinking

🧠 aniket@kali:~$ systemctl status cybersecurity_focus

  ● cybersecurity_focus.service — Active Threat Intelligence Unit
      Status: Running

  ──────────────────────────────────────────────
   PROCESS              STATE         PRIORITY
  ──────────────────────────────────────────────
   Malware Analysis     ACTIVE        HIGH
   Threat Hunting       ACTIVE        HIGH
   Blue Team Ops        ACTIVE        HIGH
   Memory Forensics     ACTIVE        MEDIUM
   Network Analysis     ACTIVE        MEDIUM
   Linux Hardening      ACTIVE        MEDIUM
  ──────────────────────────────────────────────

🌐 aniket@kali:~$ cat /etc/connect.conf



👾 aniket@kali:~$ curl tryhackme.com/p/ShoorveerChap


TryHackMe Badge


⚙️ aniket@kali:~$ lsmod --tech-stack


// Programming & Scripting

// Systems & Security

🛠️ aniket@kali:~$ ls -la /opt/security-tools/


// Malware Analysis & Reverse Engineering

// Dynamic & System Analysis

// Memory Forensics

// Network & Reconnaissance

// Security Platforms & SIEM

// Operating Systems & Environments

// Threat Intelligence

📊 aniket@kali:~$ fetch --stats github.com/ianiketkumar7

🧪 aniket@kali:~$ cat /var/log/featured_work.log

  ┌─────────────────────────────────────────────────────────────────┐
  │                        FEATURED WORK                           │
  ├─────────────────────────────────────────────────────────────────┤
  │  🔬  Malware Analysis Projects                                  │
  │  🛡️  Security Research & Hands-on Labs                          │
  │  🏁  CTF Writeups & Exploitation Challenges                     │
  │  💻  Coding Projects & their GitHub Repositories               │
  │  🕵️  Steganography & Data Hiding Project                        │
  │  ⚙️  Security Automation & Scripting Works                      │
  │  🖥️  Linux System Administration Projects                       │
  └─────────────────────────────────────────────────────────────────┘

🚀 aniket@kali:~$ echo $MOTTO

  OUTPUT >> "Analyze. Detect. Defend."

⚠️ aniket@kali:~$ cat /etc/disclaimer.d/notice.txt

  [!] NOTICE   : For educational and ethical cybersecurity purposes only.
  [!] POLICY   : All analysis performed in controlled lab environments.

Securing systems. Strengthening defenses. Serving the nation.

Pinned Loading

  1. Malware-Analysis-ftW.exe-Trojan-MSIL-BPLogger Malware-Analysis-ftW.exe-Trojan-MSIL-BPLogger Public

    In-depth analysis of ftW.exe, a .NET-based Trojan (MSIL/BPLogger) covering reverse engineering, memory forensics, and behavioral analysis.

  2. Steganography_Project_AICTE Steganography_Project_AICTE Public

    SECURE THE DATA TO PREVENT HACKERS

    Python

  3. MythX-EndGame-CTF-Writeup MythX-EndGame-CTF-Writeup Public

    Full writeup of MythX EndGame PR0T0C0L CTF covering crypto, web, forensics, OSINT & real-world vulnerabilities.

  4. Summer_Training_Projects Summer_Training_Projects Public

    RedHat Linux System Administration Training

    Shell

  5. Chakravyuh-CTF Chakravyuh-CTF Public

    Capture The Flag Walkthrough