Profile
>
Post by Praharsh
Praharsh Kumar

Praharsh Kumar

Cybersecurity Analyst | Security Operations

Delhi, Delhi

Praharsh Kumar

3 weeks ago

Cybersecurity Projects - SOC Analysis, Threat Intelligence & Digital Forensics

PROJECT 1:

Title: Splunk SIEM Dashboard - SSH Threat Detection

Link:

praharshkumar23/
Splunk-SSH-Attack-...
@" SSH Attack Defense Dashboard v2.0 | Splunk

SIEM + Zeek Logs @ Real-time Risk Scoring «
Brute Force Detection...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Splunk-SSH-Attack-Defense-v2: ๐Ÿ” SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs ๐Ÿšจ Real-time Risk Scoring โ€ข Brute Force Detection โ€ข Global Attack Heatmap โœ… Enhanced for SOC Analysts | Interactive Drilldowns | Production Ready

๐Ÿ” SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs ๐Ÿšจ Real-time Risk Scoring โ€ข Brute Force Detection โ€ข Global Attack Heatmap โœ… Enhanced for SOC Analysts | Interactive Drilldowns | Product...

https://github.com/praharshkumar23/Splunk-SSH-Attack-Defense-v2

Description: Built SIEM dashboard for real-time threat analysis using Zeek logs. Detected SSH brute-force attacks with 90%+ accuracy. Reduced triage time by 40%.


PROJECT 2:

Title: Multi-Source Log Correlation Lab

Link:

praharshkumar23/SOC-
Multi-Source-Log-...

This project simulates a real SOC triage scenario
where web attacks, SSH brute force, and firewall
logs are correlated to...

A 1 ©o wo %0

Contributor Issues Stars Forks

GitHub - praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab: This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives.

This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives. - praharshkumar23...

https://github.com/praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab

Description: 6-VM SOC lab correlating SSH, DNS, and Windows logs. Built Splunk correlation rules detecting lateral movement and DNS tunneling with MITRE ATT&CK mappings.


PROJECT 3:

Title: Windows Digital Forensics Investigation

Link:

praharshkumar23/
Windows-Digital-...
This project focuses on Windows Digital Forensics

and Incident Response (DFIR). The objective is to
analyze Windows forensic artifacts to...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project: This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential compromise, and attacker traces using industry-standard forensic methodology. This project is designed to simulate real-world SOC / DFIR investigations.

This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential comp...

https://github.com/praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project

Description: Forensic analysis on compromised Windows system. Analyzed Event Logs, Registry, Prefetch files. Documented persistence mechanisms and attack timeline.


PROJECT 4:

Title: Malware Analysis & Threat Research

Link:

praharshkumar23/
Malware-analysis-sample

Proficient in malware analysis with strong
understanding of malicious execution lifecycles.
Experienced in identifying infection vectors,
execution triggers, persistence mechanismes,...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Malware-analysis-sample: Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload delivery, and C2 communication. Skilled in behavioral analysis to detect evasion techniques and support effective remediation and mitigation strategies.

Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload deliver...

https://github.com/praharshkumar23/Malware-analysis-sample

Description: Analyzed malware samples in sandbox environment. Studied execution lifecycle, persistence, defense evasion, and C2 communication. Extracted IOCs.


PROJECT 5:

Title: Phishing Campaign Investigation

Link:

TvxsL.png

Build software better, together

GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.

https://github.com/praharshkumar23/Phishing-Analysis-Investigation

Description: Analyzed 12+ phishing campaigns. Performed header analysis, URL defanging, attachment analysis, and sender infrastructure investigation using OSINT.

0 likes ยท 0 comments

Portfolio & Services

Praharsh Kumar

3 weeks ago

Cybersecurity Projects - SOC Analysis, Threat Intelligence & Digital Forensics

Project 1:

Title: Threat Intelligence Enrichment - Splunk Dashboard
Link:

praharshkumar23/
Splunk-SSH-Attack-...
@" SSH Attack Defense Dashboard v2.0 | Splunk

SIEM + Zeek Logs @ Real-time Risk Scoring «
Brute Force Detection...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Splunk-SSH-Attack-Defense-v2: ๐Ÿ” SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs ๐Ÿšจ Real-time Risk Scoring โ€ข Brute Force Detection โ€ข Global Attack Heatmap โœ… Enhanced for SOC Analysts | Interactive Drilldowns | Production Ready

๐Ÿ” SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs ๐Ÿšจ Real-time Risk Scoring โ€ข Brute Force Detection โ€ข Global Attack Heatmap โœ… Enhanced for SOC Analysts | Interactive Drilldowns | Product...

https://github.com/praharshkumar23/Splunk-SSH-Attack-Defense-v2


Description: Built SIEM dashboard for real-time threat analysis using Zeek logs. Detected SSH brute-force attacks with 90%+ accuracy. Reduced triage time by 40%.

Project 2:

Title: SOC Multi-Source Log Correlation Lab
Link:

praharshkumar23/SOC-
Multi-Source-Log-...

This project simulates a real SOC triage scenario
where web attacks, SSH brute force, and firewall
logs are correlated to...

A 1 ©o wo %0

Contributor Issues Stars Forks

GitHub - praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab: This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives.

This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives. - praharshkumar23...

https://github.com/praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab


Description: 6-VM SOC lab correlating SSH, DNS, and Windows logs. Built Splunk correlation rules detecting lateral movement and DNS tunneling with MITRE ATT&CK mappings.

Project 3:

Title: Windows Digital Forensics Investigation
Link:

praharshkumar23/
Windows-Digital-...
This project focuses on Windows Digital Forensics

and Incident Response (DFIR). The objective is to
analyze Windows forensic artifacts to...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project: This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential compromise, and attacker traces using industry-standard forensic methodology. This project is designed to simulate real-world SOC / DFIR investigations.

This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential comp...

https://github.com/praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project


Description: Forensic analysis on compromised Windows system. Analyzed Event Logs, Registry, Prefetch files. Documented persistence mechanisms and attack timeline.

Project 4:

Title: Malware Threat Research
Link:

praharshkumar23/
Malware-analysis-sample

Proficient in malware analysis with strong
understanding of malicious execution lifecycles.
Experienced in identifying infection vectors,
execution triggers, persistence mechanismes,...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Malware-analysis-sample: Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload delivery, and C2 communication. Skilled in behavioral analysis to detect evasion techniques and support effective remediation and mitigation strategies.

Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload deliver...

https://github.com/praharshkumar23/Malware-analysis-sample


Description: Analyzed malware samples in sandbox environment. Studied execution lifecycle, persistence, defense evasion, and C2 communication. Extracted IOCs for threat intelligence.

Project 5:

Title: Phishing Investigation & IOC Extraction
Link:

JEQ5o.png

Build software better, together

GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.

https://github.com/praharshkumar23/Phishing-Analysis-Investigation


Description: Analyzed 12+ phishing campaigns. Performed header analysis, URL defanging, attachment analysis, and sender infrastructure investigation using OSINT.

0 likes ยท 0 comments

Portfolio & Services

Do you want to manage your own group?

orange logo