Skip to content
View Shaheer-Cybersec's full-sized avatar

Block or report Shaheer-Cybersec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Shaheer-Cybersec/README.md

Shaheer Hussain | Cybersecurity Analyst & AI Developer

Offensive Security + Intelligent Automation

Building AI-powered security tools while practicing penetration testing and threat detection. Currently executing a 90-day public build plan to ship 10+ projects at the intersection of both disciplines.

πŸ”— All platforms: linktr.ee/shaheersec
🎯 TryHackMe: Top 5% | 110+ rooms | 16 badges
πŸ“ Based in: Pakistan | Open to remote work


πŸ€– AI Security Tools

AI Log Analyzer β€” Week 2 Project

LangChain β€’ Ollama (Llama 3.1) β€’ 100% Local

Query security logs in natural language. Ask "Show failed SSH attempts from China in last hour" and get instant threat analysis. Built for SOC teams who need fast log triage without cloud dependencies.

Key Features:

  • Natural language log queries
  • Threat severity scoring
  • Zero API costs (local Ollama)
  • Privacy-first (no data leaves your network)
# Talk to your logs like a SOC analyst
"Identify brute force patterns in authentication logs"
"Summarize critical security events from last 24 hours"
"Find lateral movement indicators"

Security News Aggregator β€” Week 1 Project

n8n β€’ CISA KEV API β€’ Slack Integration

Automated CISA Known Exploited Vulnerabilities monitoring. Pulls CVEs by severity, filters noise, delivers actionable intel to Slack. Set it and forget it.


ReconX β€” OWASP Top 10 Scanner

Python β€’ MIT Licensed

Automated web application reconnaissance and vulnerability scanner for penetration testing workflows. Streamlines initial recon phase.


πŸ”’ Offensive Security Work

EULE-IDPS β€” Network Intrusion Detection

Wazuh β€’ Snort β€’ Real-time Monitoring

Intrusion detection and prevention system developed as final year project. Real-time network monitoring with custom detection rules.


Windows Server β€’ Kali Linux β€’ MITRE ATT&CK

Simulated enterprise AD environment for practicing:

  • Kerberoasting
  • Pass-the-Hash attacks
  • Golden Ticket attacks
  • Lateral movement techniques
  • MITRE ATT&CK mapping

20+ commits documenting attack chains and defensive countermeasures.


Splunk SIEM β€’ Custom Detection Rules

Built custom detection rules for common attack patterns. Hands-on SIEM work simulating SOC analyst workflows.


Kali Linux β€’ Metasploitable β€’ Penetration Testing

Practicing reconnaissance, scanning, and exploitation techniques in controlled environment.


πŸ’Ό Professional Background

6-7 years practical cybersecurity experience:

  • Cybersecurity Analyst/Pentesting Intern β€” Sybrid (Lakson Group)
    Vulnerability assessments, penetration testing, security documentation

  • IT Security Consultant β€” iCase
    Security audits and compliance assessments

  • Cybersecurity Instructor β€” Tutor-ESA
    Taught CEH certification prep to US-based students


πŸŽ“ Credentials

Active Certifications:

  • ISC2 Certified in Cybersecurity (CC)
  • APIsec University β€” API Penetration Testing

In Progress:

  • Certified Ethical Hacker (CEH) v13
  • eLearnSecurity Junior Penetration Tester (eJPT)

Training Platforms:

  • TryHackMe: Top 5% global ranking | 110+ rooms completed | Red Team learning path
  • HackTheBox: Active offensive security path

πŸ› οΈ Technical Stack

AI & Automation

LangChain β€’ LangGraph β€’ Ollama β€’ Python β€’ Claude API β€’ n8n β€’ Docker

Offensive Security

Burp Suite β€’ Metasploit β€’ Nmap β€’ Wireshark β€’ Kerberos attacks β€’ API testing β€’ Active Directory exploitation

Detection & Defense

Splunk β€’ Wazuh β€’ Snort β€’ MITRE ATT&CK β€’ Log analysis β€’ SIEM operations

Environments

Kali Linux β€’ Windows Server β€’ VMware β€’ Virtualbox β€’ Git/GitHub


πŸš€ Current Focus: 90-Day Build Plan

Goal: Ship 10+ AI-powered cybersecurity tools while documenting everything publicly.

Progress: Week 2 of 12 complete
Roadmap: ai-cybersecurity-journey

Why this combination matters:

  • Traditional security tools are reactive β†’ AI enables proactive threat hunting
  • SOC teams drowning in logs β†’ LLMs provide instant analysis
  • Manual pentesting is slow β†’ AI accelerates reconnaissance
  • Most security professionals ignore AI β†’ competitive advantage

Building in public. Weekly updates across all platforms.


πŸ“¬ Let's Connect

Seeking: Security Analyst | Penetration Tester | AI Security Engineer roles
Work Mode: Remote preferred | Rawalpindi/Islamabad available
Status: Preparing for MSc Cyber Security in UK

πŸ“§ Email: shaheersec6@gmail.com
πŸ”— All platforms: linktr.ee/shaheersec
πŸ’Ό LinkedIn: Shaheer Hussain


πŸ“Š GitHub Activity

GitHub Stats

Streak

Top Languages


Cybersecurity Analyst & AI Developer
Shipping: Multi-agent threat intelligence system (Week 3) | Next: Automated incident response (Week 4)

Pinned Loading

  1. ReconX ReconX Public

    Automated web application reconnaissance and vulnerability scanner for OWASP Top 10 testing.

    Python

  2. ai-cybersecurity-journey ai-cybersecurity-journey Public

    90-day public journey building AI-powered cybersecurity tools using LangChain, Python, and n8n. Follow along @shaheersec

    1