Skip to content
View DurgaPrasasd264's full-sized avatar

Block or report DurgaPrasasd264

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DurgaPrasasd264/README.md
╔══════════════════════════════════════════════════════════════════╗
║  ██████╗ ██╗   ██╗██████╗  ██████╗  █████╗     ██████╗ ██████╗  ║
║  ██╔══██╗██║   ██║██╔══██╗██╔════╝ ██╔══██╗    ██╔══██╗╚════██╗ ║
║  ██║  ██║██║   ██║██████╔╝██║  ███╗███████║    ██████╔╝ █████╔╝ ║
║  ██║  ██║██║   ██║██╔══██╗██║   ██║██╔══██║    ██╔═══╝ ██╔═══╝  ║
║  ██████╔╝╚██████╔╝██║  ██║╚██████╔╝██║  ██║    ██║     ███████╗ ║
║  ╚═════╝  ╚═════╝ ╚═╝  ╚═╝ ╚═════╝ ╚═╝  ╚═╝    ╚═╝     ╚══════╝ ║
╚══════════════════════════════════════════════════════════════════╝

> KOYYA NAGA DURGA PRASAD

SOC Analyst · Threat Hunter · Defender in Training

Typing SVG


> whoami

$ cat /etc/analyst-profile.conf

NAME        = "Koyya Naga Durga Prasad"
ROLE        = "Aspiring SOC Analyst"
LOCATION    = "India"
EDUCATION   = "B.Tech CSE — Krishna University (2021–2025) | CGPA: 8.0"
GATE        = "QUALIFIED — 2025"
MISSION     = "Understand how attackers think. Build defenses that catch them."
STATUS      = "Actively learning | Building labs | Chasing certs"

🎯 My approach: Don't just study theory — build labs, simulate attacks, analyze logs. Every project here reflects a real SOC workflow or defensive technique.


> cat skills.txt

🛡️ SOC Operations 🔧 Security Tools 📐 Frameworks
Alert Triage Splunk SIEM MITRE ATT&CK
Log Analysis Wireshark Cyber Kill Chain
Incident Investigation Kali Linux NIST IR Lifecycle
Threat Detection Nmap · Nessus Diamond Model
Phishing Analysis Burp Suite OWASP Top 10
IOC Extraction VirusTotal STRIDE

> ls -la /projects

🔴 [01] — SOC Mini Home Lab

Simulating a real Security Operations Center from scratch

📁 soc-mini-homelab/
├── 🖥️  Splunk SIEM         → Ingestion, parsing, dashboards
├── 🐧  Kali Linux           → Attack simulation (scans, brute-force)
├── 🪟  Windows 11           → Log source + Splunk Universal Forwarder
├── 🌐  Ubuntu Server        → Additional log endpoint
└── 📊  SOC Dashboard        → Real-time alert monitoring

What I built:

  • ✅ Windows event log collection via Splunk Universal Forwarder
  • ✅ Authentication monitoring & anomaly detection rules
  • ✅ Live attack simulation → trace analysis pipeline
  • ✅ Custom SOC dashboards with alert correlation

View Project


🟡 [02] — Phishing Email Investigation

Full phishing analysis workflow — from raw email to threat report

📁 phishing-investigation/
├── 📧  Header Analysis      → Sender spoofing, relay hops, X-headers
├── 🔍  IOC Extraction       → IPs, URLs, hashes, domains
├── 🌐  Domain Intelligence  → WHOIS, VirusTotal, URLScan
└── 🗺️  ATT&CK Mapping       → T1566.001 — Spearphishing Attachment

Techniques covered:

  • ✅ Email header forensics & spoofing detection
  • ✅ URL defanging & sandbox detonation workflow
  • ✅ Threat intel correlation (VirusTotal / AbuseIPDB)
  • ✅ Full investigation report with ATT&CK technique mapping

View Project


🟠 [03] — Malware Behavior Study (Keylogger Lab)

Understand malware from the inside out — to defend against it

📁 keyboard-monitoring-lab/
├── 🐍  Python Keylogger     → Behavior simulation (educational)
├── 🔬  Behavior Analysis    → Data capture, exfiltration simulation
└── 🛡️  Detection Strategy   → EDR indicators, process monitoring

What I learned:

  • ✅ How keyloggers operate at the OS level
  • ✅ Defensive indicators: process names, registry keys, network calls
  • ✅ Detection logic applicable to SIEM/EDR environments

View Project


> cat certifications.log

[✅ COMPLETED ]  GATE 2025 — Computer Science & IT
[🔄 IN PROGRESS]  CompTIA Security+ (SY0-701)
[🎯 NEXT TARGET]  CompTIA CySA+ / Blue Team Labs / TryHackMe SOC Level 1

> ./stats.sh

GitHub Streak


> ping me

LinkedIn Email GitHub


> tail -f /var/log/activity.log

[2025-xx-xx]  🔵  Building: SOC homelab with Elastic SIEM (upcoming)
[2025-xx-xx]  🟢  Practicing: TryHackMe SOC Level 1 path
[2025-xx-xx]  🟡  Studying: CompTIA Security+ domains
[2025-xx-xx]  🔴  Analyzing: New phishing campaign samples

╔════════════════════════════════════════════╗
║  "The best defense is knowing the offense" ║
║                                            ║
║   Every log tells a story.                 ║
║   I'm learning to read them.               ║
╚════════════════════════════════════════════╝

Profile Views

⚠️ All projects are for educational and defensive cybersecurity research purposes only.

Pinned Loading

  1. SOC-Mini-Homelab SOC-Mini-Homelab Public

    SOC Mini Homelab using Splunk SIEM with Windows, Windows Server and Ubuntu log forwarding

    1

  2. Phishing-Email-Investigation Phishing-Email-Investigation Public

    SOC-style phishing email investigation covering header analysis, IOC extraction, URL and attachment analysis, and threat classification.

  3. log-analysis-brute-force-detection-splunk log-analysis-brute-force-detection-splunk Public

    End-to-end SOC project simulating RDP brute-force attack, remote access, and detection using Splunk SIEM with log analysis, correlation, and network traffic inspection.

    1

  4. keyboard-monitoring-security-lab keyboard-monitoring-security-lab Public

    Educational keyboard monitoring lab for SOC and blue team learning, demonstrating keystroke logging behavior and defensive detection concepts.

    Python

  5. Authentication-Labs Authentication-Labs Public

    This repository contains multiple authentication-related security labs covering credential enumeration, authentication bypass, brute-force flaws, and side-channel leaks. Each lab includes step-by-s…

    1

  6. titan-shield-cyber-incident-investigation titan-shield-cyber-incident-investigation Public

    SOC-style cyber incident investigation using KQL, Microsoft Defender XDR, and threat intelligence to analyze phishing, malware execution, data exfiltration, and nation-state threat actors.