Skip to content
View hunter-0x7's full-sized avatar
πŸ’­
Working
πŸ’­
Working

Highlights

  • Pro

Block or report hunter-0x7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hunter-0x7/README.md

πŸ’« About Me

πŸ‘‹ Hey, I'm Naresh (hunter-0x7)

πŸ” Cybersecurity Analyst | SOC Operations | Bug Hunting 🧠 Threat Detection β€’ Log Analysis β€’ Web & API Security β€’ Cloud Security

βš”οΈ About Me

  • πŸ” Experience in monitoring security alerts, log analysis, and incident investigation
  • 🧠 Focused on threat detection, event correlation, and reducing false positives
  • πŸ›‘οΈ Hands-on exposure to SIEM and EDR environments (Splunk, CrowdStrike)
  • 🐞 Exploring real-world vulnerabilities through bug bounty platforms (HackerOne, Bugcrowd, Intigriti)
  • 🎯 Interested in Web & API Security, Access Control, and modern attack techniques

🧰 Skills

πŸ”Ή Security Operations & Monitoring

  • Monitoring security events and performing alert triage using SIEM platforms (Splunk, Azure Sentinel)
  • Analyzing logs and correlating events to identify potential threats

πŸ”Ή Incident Response & Investigation

  • Investigating alerts and validating suspicious activities using SIEM and EDR (CrowdStrike)
  • Supporting incident response workflows, documentation, and remediation tracking

πŸ”Ή Threat Analysis

  • Analyzing phishing attempts, suspicious behavior, and security anomalies
  • Understanding attack patterns and indicators of compromise

πŸ”Ή Vulnerability Assessment & Bug Hunting

  • Performing vulnerability assessments using tools like Qualys
  • Testing web applications for OWASP Top 10 vulnerabilities
  • Identifying issues such as XSS, IDOR, and access control flaws

πŸ”Ή Web & API Security

  • Analyzing HTTP requests and testing applications using Burp Suite
  • Testing APIs and validating request/response flows using Postman

πŸ”Ή Network & Traffic Analysis

  • Analyzing network traffic using Wireshark
  • Performing network scanning and service enumeration using Nmap

πŸ”Ή Cloud Security

  • Monitoring and analyzing security events in Microsoft Azure environments
  • Understanding cloud security concepts and shared responsibility model

πŸ”Ή Scripting & Automation

  • Automating security tasks and workflows using Python

πŸš€ Experience

  • 🏒 SOC Analyst Intern – Airtel
  • πŸ›‘οΈ Cybersecurity Analyst Intern – Black Innovations
  • 🐞 Bug Bounty Researcher – HackerOne, Bugcrowd,Intigriti

πŸ§ͺ What I Do

  • πŸ”Ž Monitor and analyze security alerts to identify threats
  • πŸ“Š Investigate logs, network traffic, and suspicious activities
  • 🧠 Study real-world attack techniques and detection methods
  • 🐞 Identify vulnerabilities in web applications and APIs
  • βš™οΈ Improve security workflows and analysis processes

πŸ† Certifications

  • πŸ“œ ISO/IEC 27001:2022 Information Security Associate

🧠 Current Focus

  • Threat Detection & SOC Operations
  • Incident Response & Log Analysis
  • Web & API Security
  • Cloud Security

πŸ“« Connect

🌐 Socials:

LinkedIn X email

πŸ’» Tech Stack:

JavaScript Bash Script Python Azure NPM Next JS

Pinned Loading

  1. CVE-2025-55182 React Server Componen... CVE-2025-55182 React Server Components RCE POC
    1
    POST / HTTP/1.1
    2
    Host: localhost
    3
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
    4
    Next-Action: x
    5
    Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
  2. A-to-Z-Vulnerabilities A-to-Z-Vulnerabilities Public

    Forked from 0xKayala/A-to-Z-Vulnerabilities

    This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order

  3. AllAboutBugBounty AllAboutBugBounty Public

    Forked from daffainfo/AllAboutBugBounty

    All about bug bounty (bypasses, payloads, and etc)

  4. allcloudrecon allcloudrecon Public

    Forked from s0calledhacker/allcloudrecon

    CloudRecon is a Bash script designed to scan all cloud environment IP ranges and extract data from SSL certificates. It pulls information such as wildcard subdomains and related info, saving the re…

    Shell

  5. ars0n-framework-v2 ars0n-framework-v2 Public

    Forked from R-s0n/ars0n-framework-v2

    Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros

    JavaScript

  6. awesome-soc-analyst awesome-soc-analyst Public

    Forked from st0pp3r/awesome-soc-analyst

    Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, podcasts, Twitter/X accounts and a set of tools relevant to th…

    HTML