- π I am a highly motivated and detail-oriented cybersecurity researcher.
- π‘οΈ I specialize in penetration testing, digital forensics, and software-defined radio (SDR) security.
- π I am skilled in reconnaissance and OSINT, including background checks on individuals and organizations.
- π I focus on web security, using tools like Burp Suite for manual testing and Nuclei, Nikto, and Nessus for automation.
- π§ͺ For digital forensics, I work with tools such as The Sleuth Kit (TSK), Autopsy, EaseUS, Fmem, Hex editors, and Hashdump.
- π§© I can conduct security audits using the NIST Cybersecurity Framework (CSF).
- π Experienced with SIEM tools like Splunk and Microsoft Sentinel.
- π§βπ» I understand and read code in C++, Bash, JavaScript, HTML, CSS, and SQL.
- π₯οΈ I have a deep understanding of operating systems, and concepts like parallel and concurrent processing.
- π€ I develop automation scripts for bug bounty recon.
- π Iβm always hungry for knowledge in my domain!
These are some of the foundational and advanced books that have contributed to my cybersecurity knowledge:
- Web Application Security: A Hacker's Handbook by Dafydd Stuttard & Marcus Pinto
- Linux Basics for Hackers by OccupyTheWeb
- Bug Bounty Bootcamp by Vickie Li
- Computer Networking: A Top-Down Approach by James Kurose & Keith Ross
- Network Basics for Hackers by OccupyTheWeb
Explore some of my real-world security reports and documents hosted in my Cybersecurity Portfolio Repository:
- capture the hash and cracked it of my home wifi network .
- Tools used: Kali Linux, Aircrack-ng, Hashcat
- Skills demonstrated: Wireless network enumeration, handshake analysis, password cracking, and basic Wi-Fi pentesting techniques .
- link to the docx file of the report generated
- Directory bruteforcer tool made in bash
- [A automatic fuzzer that can take a file of neumorous urls and can bruteforce direcotories one by one , rermain undetected and works best on low resource linux system such 1gb ram vps ]
- selection sort
- [Time complexities]:
- [worst case O(n^2)]
- [best case o(n^2)]
- [avg case o(n^2)]
- [space complexity O(1)]
- insertion sort
- [Time complexities]:
- [worst case O(n^2)]
- [best case o(n)]
- [avg case o(n^2)]
- [space complexity O(1)]
- Bubble sort
- [Time complexities]:
- [worst case O(n^2)]
- [best case o(n)]
- [avg case o(n^2)]
- [space complexity O(1)]
- counting sort
- [Time complexities]:
- [worst case O(n + k)]
- [best case O(n + k)]
- [avg case O(n + k)]
- [space complexity O(k)]
- π§ Email: ([email protected])
- π§ LinkedIn: (www.linkedin.com/in/muhammad-murtaza-775011240)
β‘ "Cybersecurity is not just a profession β it's a mindset!"