Skip to content
View ciscothehackergod's full-sized avatar

Block or report ciscothehackergod

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ciscothehackergod/README.md

Hi πŸ‘‹, I'm Murtaza

Cybersecurity Researcher | Web-app Penetration Tester | Digital Forensics Enthusiast


🧠 About Me

  • πŸ” I am a highly motivated and detail-oriented cybersecurity researcher.
  • πŸ›‘οΈ I specialize in penetration testing, digital forensics, and software-defined radio (SDR) security.
  • πŸ” I am skilled in reconnaissance and OSINT, including background checks on individuals and organizations.
  • 🌐 I focus on web security, using tools like Burp Suite for manual testing and Nuclei, Nikto, and Nessus for automation.
  • πŸ§ͺ For digital forensics, I work with tools such as The Sleuth Kit (TSK), Autopsy, EaseUS, Fmem, Hex editors, and Hashdump.
  • 🧩 I can conduct security audits using the NIST Cybersecurity Framework (CSF).
  • πŸ“Š Experienced with SIEM tools like Splunk and Microsoft Sentinel.
  • πŸ§‘β€πŸ’» I understand and read code in C++, Bash, JavaScript, HTML, CSS, and SQL.
  • πŸ–₯️ I have a deep understanding of operating systems, and concepts like parallel and concurrent processing.
  • πŸ€– I develop automation scripts for bug bounty recon.
  • πŸ“š I’m always hungry for knowledge in my domain!

πŸ“š Books I've Read

These are some of the foundational and advanced books that have contributed to my cybersecurity knowledge:

  • Web Application Security: A Hacker's Handbook by Dafydd Stuttard & Marcus Pinto
  • Linux Basics for Hackers by OccupyTheWeb
  • Bug Bounty Bootcamp by Vickie Li
  • Computer Networking: A Top-Down Approach by James Kurose & Keith Ross
  • Network Basics for Hackers by OccupyTheWeb

πŸ”§ Tools & Skills

πŸ› οΈ My Practical Work

Explore some of my real-world security reports and documents hosted in my Cybersecurity Portfolio Repository:

πŸ” Cybersecurity & Incident Response

🧩 Security Frameworks & Audits

⌨️ Wi-Fi Handshake Capture and Password Cracking Simulation (Home Lab)

  • capture the hash and cracked it of my home wifi network .
  • Tools used: Kali Linux, Aircrack-ng, Hashcat
  • Skills demonstrated: Wireless network enumeration, handshake analysis, password cracking, and basic Wi-Fi pentesting techniques .
  • link to the docx file of the report generated

πŸ–₯️ Operating Systems

πŸ’Ύ SQL Security

πŸ’Ύ Automation tool in bash

  • Directory bruteforcer tool made in bash
  • [A automatic fuzzer that can take a file of neumorous urls and can bruteforce direcotories one by one , rermain undetected and works best on low resource linux system such 1gb ram vps ]

πŸ–₯️ Analysis of algorithms in python

  • selection sort
  • [Time complexities]:
  • [worst case O(n^2)]
  • [best case o(n^2)]
  • [avg case o(n^2)]
  • [space complexity O(1)]
  • insertion sort
  • [Time complexities]:
  • [worst case O(n^2)]
  • [best case o(n)]
  • [avg case o(n^2)]
  • [space complexity O(1)]
  • Bubble sort
  • [Time complexities]:
  • [worst case O(n^2)]
  • [best case o(n)]
  • [avg case o(n^2)]
  • [space complexity O(1)]
  • counting sort
  • [Time complexities]:
  • [worst case O(n + k)]
  • [best case O(n + k)]
  • [avg case O(n + k)]
  • [space complexity O(k)]

🐍 An algorithm made in python that can update contents in a file

-algorithm link

πŸ“« Let's Connect!


πŸ“Š GitHub Stats


⚑ "Cybersecurity is not just a profession β€” it's a mindset!"

Pinned Loading

  1. cybersecurity-portfolio cybersecurity-portfolio Public

    1