Skip to content
View waris206's full-sized avatar

Highlights

  • Pro

Block or report waris206

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
waris206/README.md

πŸ•΅οΈβ€β™‚οΈ Akash Waris

Cybersecurity Enthusiast β€’ CTF Player β€’ Red Team Recon Automation Builder

Profile Views


πŸ›‘οΈ About Me

I’m a cybersecurity learner focused on:

  • πŸ” Web application penetration testing
  • πŸ•³οΈ Red team recon & automation
  • 🧩 Cryptography & steganography challenges
  • 🧬 DFIR (Digital Forensics & Incident Response)
  • πŸ› οΈ Building tooling to accelerate offensive workflows

Currently:

  • 🚧 Building: Phantom_Recon (modular red-team recon automation)
  • 🎯 Grinding paths & rooms on TryHackMe to deepen practical knowledge
  • πŸ‘₯ Competing with my CTF team: Binary_Beasts
  • 🧠 Always looking for harder problems to reverse, decode, break (ethically), or defend

Pronouns: he/him


🧰 Tech & Tools

Languages: Python C++
Pentest / Offensive: Burp Suite Gobuster Nmap wfuzz sqlmap
Crypto / Stego: CyberChef Ghidra HxD zsteg steghide
Reverse / Forensics: Autopsy Brim NetworkMiner Wireshark strings binwalk
Cracking: John the Ripper hashcat
Other: Git Linux ghidra


🧠 CTF Experience

I actively participate in CTFs to sharpen fundamentals through real-world style challenges.

Events / Platforms:

  • 🎯 PicoCTF
  • 🎯 US Cyber Games Competitive Season
  • 🎯 Hackfinity CTF
  • 🎯 Industrial Intrusion CTF

πŸ““ Team writeups & journey:
(Replace this with the correct working link – your current URL contains spaces, which break the link.) https://waris206.github.io/Binary_Beasts-CTF-Writeups/
If the repository/page has a different slug, update accordingly.


πŸ›°οΈ Project Spotlight

πŸ”Ž Phantom_Recon (In Progress)

A modular recon automation tool aimed at:

  • Enumerating domains / subdomains
  • Passive + active data collection
  • Filtering noise to highlight exploitable surfaces
  • Designed for extensibility (plug-in style modules)

Planned Stack / Features:

  • Python-based module orchestration
  • Async tasks (e.g., aiohttp)
  • Output normalization (JSON + Markdown report generation)
  • Optional integration with tools like amass, subfinder, httpx

(Once you publish, add: demo GIF, quickstart, core modules table.)


πŸ“Š GitHub Analytics

GitHub Stats Top Languages Trophies

πŸ† TryHackMe Progress

TryHackMe Badge


πŸ” Learning Approach

I prefer:

  • Breaking β†’ Documenting β†’ Automating β†’ Teaching
  • Converting manual recon steps into reproducible tooling
  • Keeping notes in structured, repeatable formats (Markdown + scripts)
  • Diving deeper when something β€œjust works” (understanding the why)

πŸš€ Roadmap (Short-Term Goals)

Goal Status Notes
Launch Phantom_Recon MVP πŸ§ͺ In progress Core module design underway
Publish 10+ structured CTF writeups πŸ“ Ongoing Focus: web + crypto
Build a small DFIR case study repo ⏳ Planned PCAP + timeline + narrative
Earn higher TryHackMe rank πŸ”„ Active Consistent daily progress

🀝 Collaboration

Open to:

  • Building lightweight security tooling
  • Joint CTF participation
  • Writing / reviewing security content
  • Experimental research (enumeration, obfuscation, detection)

If you have an idea β†’ open an issue or send an email.


πŸ“« Contact


βš–οΈ Ethics & Disclaimer

All activities I conduct are within legal and ethical boundaries.
Content here is for educational and defensive security purposes only.
Never test systems without explicit authorization.


Popular repositories Loading

  1. Digital-Cafe-System Digital-Cafe-System Public

    Welcome to the Digital Cafe System repository! This project aims to revamp the existing cafe system at our university, which struggled to handle the increasing number of students. Our new digital s…

    C++ 1

  2. Enterprise-Network-Simulation-using-Cisco-Packet-Tracer Enterprise-Network-Simulation-using-Cisco-Packet-Tracer Public

    1

  3. ThreatLens ThreatLens Public

    AI-Driven Malware Triage & Deep Swarm Inspection Platform

    JavaScript 1

  4. waris206 waris206 Public

    Config files for my GitHub profile.

  5. Secure-client-server-model- Secure-client-server-model- Public

    C++

  6. SkyNav_ai SkyNav_ai Public

    C++