Skip to content
View DurgaPrasasd264's full-sized avatar

Block or report DurgaPrasasd264

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DurgaPrasasd264/README.md

πŸ‘‹ Hi, I'm Koyya Naga Durga Prasad

πŸ›‘οΈ Entry-Level Cybersecurity / SOC Analyst


πŸš€ About Me

πŸ” CSE graduate passionate about Cybersecurity & SOC Operations
🧠 Hands-on experience in threat detection, SIEM monitoring, phishing analysis
πŸ› οΈ Skilled with Splunk, Kali Linux, Wireshark, Nmap, Metasploit
🎯 Actively seeking SOC Analyst / Cybersecurity Analyst roles


🧩 Core Skills


πŸ› οΈ Tools & Technologies


πŸ§ͺ Featured Projects

πŸ”Ή πŸ“§ Phishing Email Analysis & SIEM

  • Analyzed email headers, URLs, and attachments
  • Correlated phishing alerts using Splunk SIEM
  • Generated incident reports with IOCs

πŸ”Ή ⌨️ keyboard-monitoring-security-lab

  • Python-based keylogger for malware behavior analysis
  • Studied stealth and persistence techniques
  • Conducted research in controlled lab environments

πŸ”Ή 🌐 Network Traffic Analysis

  • Identified suspicious traffic using Wireshark
  • Detected anomalies in simulated SOC labs

πŸŽ“ Certifications

πŸ… CEH – In Progress
πŸ… Cybersecurity with Kali Linux – Edunet
πŸ… Learn Python & Ethical Hacking – Udemy


πŸ“« Connect With Me

⚠️ All projects are created for educational and defensive security research purposes only.

Pinned Loading

  1. Authentication-Labs Authentication-Labs Public

    This repository contains multiple authentication-related security labs covering credential enumeration, authentication bypass, brute-force flaws, and side-channel leaks. Each lab includes step-by-s…

    1

  2. azure-crest-ransomware-investigation azure-crest-ransomware-investigation Public

    SOC-style ransomware investigation using KQL (Azure Data Explorer)

  3. csrf-labs csrf-labs Public

    A collection of real-world and lab-based Cross-Site Request Forgery (CSRF) vulnerability reports with detailed reproduction steps and proof-of-concepts.

    HTML

  4. keyboard-monitoring-security-lab keyboard-monitoring-security-lab Public

    Educational keyboard monitoring lab for SOC and blue team learning, demonstrating keystroke logging behavior and defensive detection concepts.

    Python

  5. Phishing-Email-Investigation Phishing-Email-Investigation Public

    SOC-style phishing email investigation covering header analysis, IOC extraction, URL and attachment analysis, and threat classification.

  6. titan-shield-cyber-incident-investigation titan-shield-cyber-incident-investigation Public

    SOC-style cyber incident investigation using KQL, Microsoft Defender XDR, and threat intelligence to analyze phishing, malware execution, data exfiltration, and nation-state threat actors.