Skip to content
View omdesale777's full-sized avatar
:bowtie:
Hey there!!
:bowtie:
Hey there!!

Highlights

  • Pro

Block or report omdesale777

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
omdesale777/README.md

Typing SVG


┌──────────────────────────────────────────────────────────────────┐
│  $ whoami                                                         │
│                                                                   │
│  > Security Engineering Intern @ CTF7                            │
│  > Computer Engineering Student — Nashik, India                  │
│  > Focus : SecOps · Detection Engineering · AI Security          │
│  > Goal  : Threat detection and security automation at scale     │
└──────────────────────────────────────────────────────────────────┘

🔍 About Me

Security-focused engineering student with a strong interest in Security Operations, detection engineering, and AI-driven security automation. I build practical tools that simulate real-world attack scenarios and sharpen defensive capabilities.

Currently deepening my foundations in networking, operating systems, log analysis, and attack detection — bridging theory with hands-on implementation.


⚙️ Current Work

Project Description Status
AI-Powered Log Analyzer FastAPI + regex tool for brute-force detection, anomaly identification, and suspicious IP analysis from system/server logs 🟢 Active
ThreatMorph GenAI-powered multi-domain threat simulation platform with automated mitigation recommendations 🟡 In Progress
AirPing Authenticated sound-based devices can operate without Bluetooth or internet connectivity. This is an offline acoustic command channel designed for trusted device recovery. 🟡 In Progress

🛠️ Technologies & Tools

Core

Linux Python Bash SQL Git FastAPI

Security & Monitoring

Wireshark Nmap Burp Suite Elasticsearch Kibana Prometheus Grafana

Cloud & Infra

AWS Docker GitHub Actions

Data & AI/ML

Pandas scikit-learn OpenAI

Development

JavaScript React Django C


📌 Featured Projects

🔎 AI-Powered Log Analyzer

FastAPI Python Regex/Grok REST API Vercel

A threat detection backend that ingests raw log text and identifies brute-force login attempts, suspicious IPs with frequency ranking, and anomalous behavior patterns. Configurable sensitivity via min_count threshold. Deployable as a serverless API.

Detection coverage: SSH brute-force · HTTP 401/403 floods · Invalid user attempts · Auth failures

🧬 ThreatMorph (In Progress)

GenAI LangChain OpenAI API Multi-Domain Low-Code

A GenAI-powered platform designed to model attacker behavior across multiple domains — web, network, and IoT — and automatically surface mitigation strategies mapped to MITRE ATT&CK techniques. Built for both red team simulation and blue team readiness.

Domains: Web · Network · IoT/Automotive · Cloud

🗺️ Detection Engineering Approach

Log Ingestion  →  Regex / Grok Parsing  →  Anomaly Detection
      ↓                                           ↓
 ELK / Splunk                          MITRE ATT&CK Mapping
      ↓                                           ↓
 Dashboards & Alerts              Sigma / YARA Rule Authoring
      ↓                                           ↓
 Prometheus + Grafana              Incident Triage & Reporting

📡 Professional Interests

  Security Operations   —  SOC workflows, detection rule authoring, SIEM
  Threat Intelligence   —  Log triage, IOC analysis, MITRE ATT&CK mapping
  AI in Cybersecurity   —  LLM-assisted detection, anomaly modelling
  Automotive Security   —  CAN bus, ISO/SAE 21434, OTA, infotainment threats
  Incident Response     —  Root cause analysis, forensics, triage

🎯 Currently Learning

  • ELK Stack — building dashboards and writing detection queries
  • Sigma rules — portable detection rule authoring
  • Docker & Kubernetes — containerizing security tooling
  • AWS fundamentals — CloudTrail, GuardDuty, IAM
  • MITRE ATT&CK — mapping detections to tactics and techniques
  • Windows internals — Event Logs, Sysmon, PowerShell auditing

📊 GitHub Activity


🤝 Connect

LinkedIn Email Twitter


Profile Views

Building practical security solutions. Continuously improving defensive capabilities.

Pinned Loading

  1. smart-city-portal-nashik smart-city-portal-nashik Public

    The Nashik Smart City Management Portal is a full-stack web application designed to facilitate citizen engagement with municipal services. It enables residents to report grievances, submit anonymou…

    TypeScript

  2. ai-log-analyzer ai-log-analyzer Public

    AI powered log analysis tool built with FastAPI for detecting brute force attacks and suspicious IP activity.

    Python

  3. django-two-factor-auth django-two-factor-auth Public

    Forked from jazzband/django-two-factor-auth

    Complete Two-Factor Authentication for Django providing the easiest integration into most Django projects.

    Python 1

  4. Ai-interview-mock Ai-interview-mock Public

    Forked from charlinishant/Ai-interview-mock

    JavaScript 1 2

  5. AiForGreenerPlanet-VibeCoding AiForGreenerPlanet-VibeCoding Public

    Forked from GDGC-MET/AiForGreenerPlanet-VibeCoding

    Our daily choices significantly impact the environment, but it's often hard to track and maintain sustainable habits. This challenge is about using AI to empower individuals with tools that promote…

  6. todo-app todo-app Public

    Simple Todo app with Golang backend

    HTML