Skip to content
View 7amo127's full-sized avatar
  • 05:49 (UTC -12:00)

Block or report 7amo127

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
7amo127/README.md

πŸ‘‹ Hi, I'm Mohamed Ahmed

πŸ” Cyber Security Graduate | Blue Team | Malware Analysis
πŸŽ“ Computer Science & Data Science – Cyber Security Specialization
πŸ“ Egypt


πŸ§‘β€πŸ’» About Me

I am a Cyber Security graduate with strong knowledge across multiple programming and scripting languages, operating systems, networking, and defensive security concepts.

My focus is on:

  • Blue Team & SOC operations
  • Malware analysis and threat detection
  • Security monitoring and incident response
  • Using programming and scripting to support security analysis, automation, and research

Currently preparing for CEH and CCNA certifications.


πŸ›‘οΈ Cyber Security Skills

  • Malware Analysis (Static & Dynamic)
  • Vulnerability Assessment & Threat Detection
  • Log Analysis & SIEM Concepts
  • Incident Response (Foundations)
  • Encryption & Cryptography Fundamentals
  • Network Security & Traffic Analysis

🌐 Networking Knowledge

  • TCP/IP, OSI Model
  • Ports, Protocols, Firewalls
  • IDS/IPS Concepts
  • Network Scanning & Analysis
  • CCNA-level Networking

πŸ’» Operating Systems

  • Linux (Kali Linux, Ubuntu)
  • Windows (Processes, Logs, Security Internals)

🧠 Programming & Scripting Languages

I use programming and scripting languages as tools for security, analysis, and automation, not just development.

  • Python – Security scripts, automation, malware analysis
  • Bash – Linux automation & security tasks
  • C++ – Low-level concepts, memory & malware behavior
  • Java – Application logic & security understanding
  • PHP – Web security awareness
  • JavaScript – Client-side security concepts
  • HTML & CSS – Web structure and attack surface understanding
  • R – Data analysis & security research

πŸ› οΈ Security Tools & Technologies

  • Nmap
  • Wireshark
  • Metasploit (Basic)
  • YARA (Rule Writing)
  • VMware (Labs & Virtualization)
  • SIEM Concepts (Monitoring & Alerts)

πŸŽ“ Education

Bachelor’s Degree in Computer Science & Data Science
Specialization: Cyber Security
Grade: Very Good


🏫 Professional Training

Information Technology Institute (ITI)

Cyber Security Training – 120 Hours
July 2024 – August 2024

  • Computer Network Fundamentals
  • Advanced Networking
  • Cyber Security Essentials
  • Ethical Hacking
  • Palo Alto Essentials (PCCET)
  • FortiGate NSE 4
  • Python Programming (MaharaTech)
  • VMware Cloud Foundation

πŸ“‚ Projects & Practical Experience

πŸ” Malware Analysis

  • Static and dynamic analysis of malicious executables
  • Understanding malware behavior and persistence mechanisms

πŸ›‘ Security & Networking Labs

  • Network scanning and traffic analysis
  • Vulnerability identification using Linux security tools

πŸ“œ Detection & Rules

  • Writing YARA rules for malware detection

(Repositories will be updated regularly with new labs and research)


πŸ“œ Certifications (In Progress)

  • CEH – Certified Ethical Hacker
  • CCNA – Cisco Certified Network Associate

🎯 Career Goals

  • Work in SOC / Blue Team environments
  • Advance in malware analysis and threat hunting
  • Strengthen defensive security and detection capabilities
  • Contribute to cybersecurity research and open-source projects

🀝 Connect With Me

⭐ Follow my repositories to see my cybersecurity journey and hands-on work.

Pinned Loading

  1. API API Public

  2. SHA512 SHA512 Public

    C++

  3. Static-Malware-Analysis Static-Malware-Analysis Public