Offensive Security + Intelligent Automation
Building AI-powered security tools while practicing penetration testing and threat detection. Currently executing a 90-day public build plan to ship 10+ projects at the intersection of both disciplines.
π All platforms: linktr.ee/shaheersec
π― TryHackMe: Top 5% | 110+ rooms | 16 badges
π Based in: Pakistan | Open to remote work
AI Log Analyzer β Week 2 Project
LangChain β’ Ollama (Llama 3.1) β’ 100% Local
Query security logs in natural language. Ask "Show failed SSH attempts from China in last hour" and get instant threat analysis. Built for SOC teams who need fast log triage without cloud dependencies.
Key Features:
- Natural language log queries
- Threat severity scoring
- Zero API costs (local Ollama)
- Privacy-first (no data leaves your network)
# Talk to your logs like a SOC analyst
"Identify brute force patterns in authentication logs"
"Summarize critical security events from last 24 hours"
"Find lateral movement indicators"Security News Aggregator β Week 1 Project
n8n β’ CISA KEV API β’ Slack Integration
Automated CISA Known Exploited Vulnerabilities monitoring. Pulls CVEs by severity, filters noise, delivers actionable intel to Slack. Set it and forget it.
ReconX β OWASP Top 10 Scanner
Python β’ MIT Licensed
Automated web application reconnaissance and vulnerability scanner for penetration testing workflows. Streamlines initial recon phase.
EULE-IDPS β Network Intrusion Detection
Wazuh β’ Snort β’ Real-time Monitoring
Intrusion detection and prevention system developed as final year project. Real-time network monitoring with custom detection rules.
Windows Server β’ Kali Linux β’ MITRE ATT&CK
Simulated enterprise AD environment for practicing:
- Kerberoasting
- Pass-the-Hash attacks
- Golden Ticket attacks
- Lateral movement techniques
- MITRE ATT&CK mapping
20+ commits documenting attack chains and defensive countermeasures.
Splunk SIEM β’ Custom Detection Rules
Built custom detection rules for common attack patterns. Hands-on SIEM work simulating SOC analyst workflows.
Kali Linux β’ Metasploitable β’ Penetration Testing
Practicing reconnaissance, scanning, and exploitation techniques in controlled environment.
6-7 years practical cybersecurity experience:
-
Cybersecurity Analyst/Pentesting Intern β Sybrid (Lakson Group)
Vulnerability assessments, penetration testing, security documentation -
IT Security Consultant β iCase
Security audits and compliance assessments -
Cybersecurity Instructor β Tutor-ESA
Taught CEH certification prep to US-based students
Active Certifications:
- ISC2 Certified in Cybersecurity (CC)
- APIsec University β API Penetration Testing
In Progress:
- Certified Ethical Hacker (CEH) v13
- eLearnSecurity Junior Penetration Tester (eJPT)
Training Platforms:
- TryHackMe: Top 5% global ranking | 110+ rooms completed | Red Team learning path
- HackTheBox: Active offensive security path
LangChain β’ LangGraph β’ Ollama β’ Python β’ Claude API β’ n8n β’ Docker
Burp Suite β’ Metasploit β’ Nmap β’ Wireshark β’ Kerberos attacks β’ API testing β’ Active Directory exploitation
Splunk β’ Wazuh β’ Snort β’ MITRE ATT&CK β’ Log analysis β’ SIEM operations
Kali Linux β’ Windows Server β’ VMware β’ Virtualbox β’ Git/GitHub
Goal: Ship 10+ AI-powered cybersecurity tools while documenting everything publicly.
Progress: Week 2 of 12 complete
Roadmap: ai-cybersecurity-journey
Why this combination matters:
- Traditional security tools are reactive β AI enables proactive threat hunting
- SOC teams drowning in logs β LLMs provide instant analysis
- Manual pentesting is slow β AI accelerates reconnaissance
- Most security professionals ignore AI β competitive advantage
Building in public. Weekly updates across all platforms.
Seeking: Security Analyst | Penetration Tester | AI Security Engineer roles
Work Mode: Remote preferred | Rawalpindi/Islamabad available
Status: Preparing for MSc Cyber Security in UK
π§ Email: shaheersec6@gmail.com
π All platforms: linktr.ee/shaheersec
πΌ LinkedIn: Shaheer Hussain
Cybersecurity Analyst & AI Developer
Shipping: Multi-agent threat intelligence system (Week 3) | Next: Automated incident response (Week 4)