Skip to content
View mohammadajani's full-sized avatar

Block or report mohammadajani

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mohammadajani/README.md

Hi, I'm Mohammad Husain A. Ajani! 😎

LinkedIn Instagram GitHub

πŸ›‘οΈ Cybersecurity Enthusiast | πŸ–₯️ Penetration Tester | πŸ” Bug Bounty Hunter


🌟 About Me

I'm a passionate Information Security Analyst with over 3 years of experience in cybersecurity, solving CTFs, conducting VAPT, and continuously learning through hands-on projects. I specialize in setting up homelabs, conducting security audits, and deploying SIEM systems.

  • 🌍 Based in Nagpur, Maharashtra, India
  • πŸŽ“ Pursuing BCA (Semester 1) at Amity University
  • πŸ’» Currently working on bug bounty programs and SIEM deployments

πŸ› οΈ Skills & Tools

Domain Tools
Cybersecurity Burp Suite, OWASP ZAP, Metasploit, Nessus
Network Wireshark, Nmap, Firewall Setup
Programming Bash, Python, Java, C#, C++
Virtualization VirtualBox, VMware
SIEM Elastic Stack (ELK), Wazuh
OS Expertise Kali Linux, Ubuntu, Red Hat, Windows

πŸ”₯ Projects

πŸš€ Homelab Setup

  • Description: Deployed virtual environments using VirtualBox and VMware to simulate real-world cybersecurity scenarios.
  • Outcome: Created a fully functional homelab for penetration testing, SIEM deployment, and network security analysis.

πŸ”’ Web Application VAPT (Alchemy Research and Clinicals)

  • Description: Performed vulnerability assessments, identifying SQL Injection and Directory Traversal vulnerabilities.
  • Outcome: Delivered detailed reports with remediation strategies to improve the client’s security posture.

πŸ“Š SIEM Deployment (Elastic Stack & Wazuh)

  • Description: Deployed Elastic Stack and Wazuh in virtual environments for real-time log monitoring and alerting.
  • Outcome: Set up automated alerts for security events and provided continuous monitoring across virtual systems.

πŸ“Š GitHub Stats

Mohammad's GitHub Stats

Top Langs


πŸ… Certifications

  • SecOps CAP (In progress, expected in 2 months)
  • Red Hat Certified System Administrator (RHCSA) (Attempted, March 2024)
  • CCNA Coursework – Networking Fundamentals

πŸ† CTF Achievements

  • TryHackMe: Completed over 45+ labs on web security, exploitation, and privilege escalation.
  • OverTheWire: Solved various Linux and command-line-based challenges to sharpen my scripting and networking skills.
  • Bug Bounty: Recently started identifying vulnerabilities in live web applications, focusing on web application security.

πŸ“¬ Let's Connect!


πŸ’‘ Fun Fact

I enjoy solving CTFs and breaking into things (ethically of course)! πŸ•΅οΈβ€β™‚οΈ


βš™οΈ Recent Activity

  1. πŸ“ Submitted bug bounty reports for a local startup.
  2. πŸ› οΈ Configured SIEM on Azure Cloud for virtual machine monitoring.
  3. πŸ” Identified SQL injection vulnerabilities during VAPT.
  4. β›³ Worked on CleanBrowse project.
  5. πŸš€ Work on SpaceManager project.

Popular repositories Loading

  1. SwiftShare SwiftShare Public

    A small project to share Text

    Shell 1

  2. stargazers stargazers Public

    Forked from drknzz/stargazers

    ⭐ Display the latest STARGAZERS of your repository ⭐

    Python 1

  3. mohammadajani mohammadajani Public

  4. CleanBrowse CleanBrowse Public

    Project CleanBrowse: Enhanced Ad-Blocking with Pi-hole and uBlock Origin

  5. SpaceManager SpaceManager Public

    This Project will help you manager your downloads folder and disk space.

    Python

  6. LazZyCorp LazZyCorp Public

    A Lore page for The LazZyCorp CTF machine.