Skip to content
View 0xcgz's full-sized avatar

Highlights

  • Pro

Block or report 0xcgz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xcgz/README.md

👨‍💻 Ali Alaradi

LinkedIn Profile Views

Typing SVG

Polytechnic Cybersecurity Student | SOC Analyst · IR Specialist · Penetration Tester

Building a strong foundation in networking, threat detection, digital forensics, and system security. Passionate about hands-on security monitoring and bridging defensive operations with offensive tactics to systematically mitigate threats.


🎯 Objective: Aspiring Security Operations Center (SOC) Analyst and IR Specialist actively seeking an internship opportunity. Focused on leveraging open-source SIEM tools, threat intelligence, and automation to detect, investigate, and respond to cyber threats in real time.


🧰 Tools & Technologies

⚔️ Offensive Security & Penetration Testing

🌐 Network Analysis & Defense

💻 Endpoint Security & DFIR

📊 SIEM, Log Analysis & Threat Intel

⚙️ Automation, Scripting & Data Analysis


🏆 Certifications

Certified Professional Penetration Tester (eCPPT)

eCPPT

  • Full-Spectrum Threat Emulation: Executing complex, multi-stage penetration tests mimicking real-world APT tactics.
  • Infrastructure & Web Exploitation: Compromising hardened network perimeters and exploiting intricate web application logic.
  • Enterprise Active Directory Exploitation: Systematically dismantling domain security, abusing Kerberos authentication, and executing complete domain privilege escalation.
  • Advanced Post-Exploitation: Mastering stealthy lateral movement, deep network pivoting, and complex privilege escalation vectors.
  • Vulnerability Weaponization: Engineering custom exploits, buffer overflows, and developing payloads to bypass modern defenses.
INE Certified Incident Responder (eCIR)

INE

  • Threat Detection & SIEM Operations
  • Multi-Source Log Correlation and IOC Analysis
  • Endpoint Telemetry and Audit Log Investigation
  • Persistence and Privilege Escalation Detection
  • Network Traffic & PCAP Analysis (C2, Lateral Movement)
  • Digital Forensics and Evidence-Based Analysis
  • Malware and Suspicious File Artifact Review
  • Threat Intelligence Mapping (MITRE ATT&CK)
  • Incident Reporting and Communication of Findings
ISC2 Certified in Cybersecurity (CC)

ISC2

  • Access Control & Security Principles
  • Security Operations & Incident Response Fundamentals
  • Network Security Concepts
  • Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Huawei HCIA-DATACOM

Huawei

  • TCP/IP Networking, VLANs, and Subnetting
  • Routing Configuration (OSPF, RIP, Static Routing)
  • Access Control Lists (ACLs) and Traffic Filtering
  • Firewall, VPN Fundamentals, MPLS, SD-WAN, and WAN Technologies
  • Dual-Stack Deployment (IPv4 & IPv6) & Secure Connectivity
  • Python Basics for Network Automation & SDN Concepts

📈 GitHub Stats


00000000  54 48 45 20 51 55 45 53 54 49 4f 4e 20 49 53 20  |THE QUESTION IS |
00000010  34 32 20 2d 20 43 41 4e 20 59 4f 55 20 46 49 4e  |42 - CAN YOU FIN|
00000020  44 20 54 48 45 20 41 4e 53 57 45 52 3f 20 4d 59  |D THE ANSWER? MY|
00000030  53 54 45 52 59 20 43 4f 44 45 20 49 53 3a 20 58  |STERY CODE IS: X|
00000040  30 52 20 34 32 20 2d 20 44 45 43 4f 44 45 3a 20  |0R 42 - DECODE: |
00000050  56 6c 71 63 6c 71 6c 71 6b 62 6f 63 20 47 62 62  |Vlqclqlqkboc Gbb|
00000060  62 61 71 20 43 6c 6a 62 61 63 6a 6a 20 34 32 20  |baq Cljbacjaaj 42 |
00000070  2d 20 41 73 68 77 6c 6a 6c 61 6c 7a 6a 63 20 47  |- Ashwljlalzjc G|
00000080  6c 61 7a 6a 63 20 34 32 2e 00 00 00 00 00 00 00  |lazjc 42........|

chmod +x ./ali-alaradi — now executing.

Popular repositories Loading

  1. Project-Mursad Project-Mursad Public

    A comprehensive virtualized SOC environment built on Proxmox. Features a segmented pfSense network, Active Directory deployment, and centralized threat monitoring using Wazuh SIEM

    HTML 1

  2. 0xcgz 0xcgz Public

    Config files for my GitHub profile. 67 SIX SEVEN. six seven 6-7

  3. ExifXtract ExifXtract Public

    A professional CLI Digital Forensics framework for universal metadata extraction, SHA256 hashing, and automated geolocation mapping. Features a built-in Privacy Shield to sanitize image trackers.

    Python

  4. 0xcgz.github.io 0xcgz.github.io Public

    DarkDork: A streamlined, web based Google Dork builder and OSINT toolkit designed for security researchers, penetration testers, and SOC analysts to accelerate reconnaissance.

    HTML