Skip to content
View vatsan404's full-sized avatar

Highlights

  • Pro

Block or report vatsan404

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vatsan404/README.md

πŸ”΄πŸ›‘οΈβ˜οΈ Srivatsan V

Offensive Operations | Defensive Analytics | Cloud Security

πŸ”΄ OFFENSIVE SECURITY - Attack Operations

Active Directory Cloud IAM Exploitation β”œβ”€β”€ Kerberos Golden Ticket β”œβ”€β”€ AWS IAM Role Assumption β”œβ”€β”€ Pass-the-Hash Attacks β”œβ”€β”€ Azure AD PIM Abuse β”œβ”€β”€ DCSync Domain Replication β”œβ”€β”€ S3 Bucket Enumeration └── BloodHound AD Paths └── GCP Service Account Abuse

☁️ CLOUD SECURITY - Infrastructure Protection

AWS Security Azure Security Google Cloud Security β”œβ”€β”€ IAM Access Analyzer β”œβ”€β”€ Defender for Cloud β”œβ”€β”€ Forseti Security β”œβ”€β”€ GuardDuty Threat Detect β”œβ”€β”€ PIM Conditional Access β”œβ”€β”€ Security Command Center β”œβ”€β”€ CloudTrail Analysis β”œβ”€β”€ Sentinel ML Workbooks └── Chronicle Detection └── Config Compliance Rules └── Azure AD Identity Secure

πŸ›‘οΈ DEFENSIVE SECURITY - Learning Detection & Response

Core Fundamentals (Study Focus): β”œβ”€β”€ Windows Event Logs (Security 4624/4672) β”œβ”€β”€ Sysmon Logging (Process Creation) β”œβ”€β”€ Basic SIEM Concepts (Splunk Free/TryHackMe) β”œβ”€β”€ Network Traffic Analysis (Wireshark) └── File Integrity Monitoring (OSSEC Basics)

πŸ› οΈ PROFESSIONAL TOOLKIT

RED TEAM: Mimikatz - Impacket - BloodHound - CrackMapExec - Rubeus - Responder - Privilege Escalation - Network Pivoting BLUE TEAM: Splunk - Elastic - Wazuh - MITRE ATT&CK Navigator CLOUD: AWS Security Hub - Azure Sentinel - GCP Chronicle - Terraform Cloud - IAM - CloudTrail - EC2 - VPC - GauardDuty DFIR: Volatility3 - KAPE - Rekall - Autopsy - Sleuth Kit - FTK Forensic Toolkit

πŸ“Š ATTACK-DEFEND PROGRESSION MATRIX

PURPLE TEAM VALIDATION:

RED TEAM LABS (βœ… Completed): β€’ Pass-the-Hash (Mimikatz) β€’ Kerberoasting (Rubeus)
β€’ PS Remoting Abuse β€’ LSASS Credential Dump

BLUE TEAM LEARNING (πŸ“š Active): β€’ Windows Event ID 4624 (Logon) β€’ Event ID 4769 (Kerberos) β€’ Sysmon Process Creation β€’ Network Connection Logs

**Active Lab**: Multi-forest AD environment + Cloud IAM federation attacks
Full-Spectrum Cybersecurity Engineer | Attack | Defend | Hunt | Respond

Streak

Pinned Loading

  1. Skyshield Skyshield Public

    Cloud Breach Simulation & Defense Automation System (CBSDAS) – Security detection, attack simulation, and automated cloud defense toolkit.

    Python

  2. AWS-IAM-ENUMERATION-CLI-COMMANDS AWS-IAM-ENUMERATION-CLI-COMMANDS Public

  3. AWS-SECRETSMANAGER-CLI-COMMANDS AWS-SECRETSMANAGER-CLI-COMMANDS Public