Skip to content
View ramyaradjesh's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ramyaradjesh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ramyaradjesh/README.md
header

Typing SVG


LinkedIn GitHub Medium TryHackMe Reddit Portfolio


Open to Work   Open to Travel   Location


🧠 About Me

🎓 DegreeMS Computer Security — EPITA, Paris  ·  B.Tech CSE — SMVEC, Puducherry
💼 ExperienceSecurity Policy Developer @ Orange Innovation  ·  Data Privacy & Innovation Team, Châtillon
🎯 FocusVAPT  ·  SOC  ·  eBPF  ·  Network Security  ·  DFIR
🏆 CTFTryHackMe  ·  RootMe
🌍 LanguagesEnglish (C1)  ·  Tamil (Native)  ·  French (B1)
📍 Status🟢 Open to Work    ✈️ Open to Travel

💼 Work Experience

🟠 Developer — Security Policy Research (eBPF)

Orange Innovation  ·  Data Privacy & Innovation Team  ·  Châtillon, Paris

Duration

View Repo

  • 🔬 Researched eBPF integration in Android mobile security — system call control & traffic monitoring
  • 🕵️ Identified eBPF operation patterns across Android OS for credential risk detection
  • 🛡️ Designed & implemented BPFroid — a novel mobile malware detection framework using eBPF
  • 🔍 Assessed OS-level compatibility and explored proof-of-concept credential-based threat detection

eBPF Android Linux Security Research


🚧 Currently Working On

🔨 Building hands-on, lab-based projects to deepen SOC, malware analysis, and threat research skills.

🦠 Antivirus Simulation

Signature Scanner + VirusTotal

Two-layer threat detection engine: local signature/hash matching + live VirusTotal cloud intelligence. Detects, flags, and reports malicious files — mimicking core production AV logic.

Python VirusTotal API Malware Analysis Threat Detection

View Repo

🏠 SOC Home Lab

Honeypot & MITRE ATT&CK Mapping

Ubuntu-based SOC lab: Wazuh SIEM for centralised logging, Cowrie SSH honeypot for attacker trapping, and auditd for endpoint monitoring. Custom detection rules + attack simulations mapped to MITRE ATT&CK.

Wazuh MITRE ATT&CK Ubuntu SOC

🛡️ Wazuh Threat Detection Lab

SIEM/XDR Detection Engineering

SOC simulation detecting real-world attacks: database exfiltration, credential theft, insider enumeration. Custom rules, active response, and full incident timelines documented.

Wazuh SIEM/XDR Incident Response

View Repo

🔭 eBPF Threat Atlas

Kernel-Level Attack Research

Mapping eBPF abuse for stealth, persistence & privilege escalation across Linux, containers & cloud-native. Building attack taxonomy: rootkit behaviours, verifier-bypass CVEs, and CAP_BPF/CAP_PERFMON hardening defences.

eBPF Kubernetes CVE Research Cloud Security


💛 Personal Projects

🐳 Docker Challenges — Pentest Report

Solved 10 Docker-based security challenges. Built a DVWA container environment, ran structured penetration tests, and documented all findings professionally.

Docker DVWA Kali Linux Penetration Testing

View Repo

🔍 VAPT — Vulnerability Assessment & Pentest

Full-scope VA: port/service enumeration, OS discovery, vulnerability scanning across networking layers, and web server assessment with severity-rated documentation.

Nmap Port Scanning Kali Linux Networking

View Repo

🌐 Web-Based VAPT

Identified & exploited IDOR, XSS → JWT token theft, and API flaws. Methodology: passive recon, credential analysis, privilege escalation — full OWASP Top 10 coverage.

XSS IDOR JWT OWASP Top 10

View Repo

✍️ CTF Write-Ups on Medium

Documenting TryHackMe room solutions & cybersecurity walkthroughs — methodology, tools, and key takeaways for the community.

TryHackMe CTF Write-Ups Medium

Read on Medium


🎓 Academic Projects

  Project Description Stack
01 🔑 Password Cracking Tool Distributed cracking system — Kubernetes, Docker & bcrypt with multiprocessing. Presented to cybersecurity professionals. Kubernetes Docker Python bcrypt
02 🖥️ Incident Response — Hardware Dump Forensic investigation extracting artefacts from a compromised server. Full timeline report produced. DFIR Kali Linux Disk Imaging Timeline
03 🛒 Web Application Security Audit CWE-based vulnerability identification & risk scoring on an e-commerce platform. OWASP Top 10 VAPT CWE
04 🗄️ Software & Database Audit CWE classification of vulnerabilities across software & database systems. Risk & severity scoring. CWE Database Security Auditing
05 🔐 Password Manager Tool Secure credential storage using Fernet symmetric encryption and salting. Python Cryptography Fernet Salting

✍️ Medium — CTF Write-Ups

📖 Detailed walkthroughs of TryHackMe rooms — methodology, tools used, and key takeaways.

💳 Billing — TryHackMe

Linux Privilege Escalation SUID Exploitation TryHackMe

Billing system vulnerability room. Covers service enumeration, SUID binary privilege escalation, and flag extraction through system misconfigurations on a realistic Linux target.

Read Write-Up

🕵️ Disgruntled — Linux Forensic Investigation

Digital Forensics Insider Threat Log Analysis TryHackMe

Insider threat simulation. Bash history, cron job, and log analysis to reconstruct a full attacker timeline from artefacts left on a compromised Linux system.

Read Write-Up

🥒 Pickle Rick — TryHackMe

Web Exploitation Command Injection Enumeration TryHackMe

Web exploitation room. Directory & source-code enumeration, command injection via web panel, and chained privilege escalation to retrieve all 3 hidden flags.

Read Write-Up

🔎 Déjà Vu — TryHackMe

OSINT Geolocation Metadata Analysis TryHackMe

OSINT investigation room. Reverse image search, metadata extraction, and geolocation to piece together a narrative and uncover hidden details across public sources.

Read Write-Up

View All Write-Ups on Medium


🛠️ Tech Stack & Skills

🛡️ Security & Tools Kali Linux · Wireshark · Nmap · Splunk · Wazuh · Burp Suite

☁️ Infrastructure & Platforms Docker · Kubernetes · Linux · Ubuntu · Cisco Packet Tracer

📋 Frameworks & Standards OWASP Top 10 · MITRE ATT&CK · ISO 27001 · NIST · GDPR

💻 Languages & Scripting Python · Bash


🎓 Education

🇫🇷 MS Computer Security

EPITA — École Pour l'Informatique et les Techniques Avancées  ·  Paris, France

Duration

🇮🇳 B.Tech Computer Science Engineering

Sri Manakula Vinayagar Engineering College  ·  Puducherry, India

Duration


🙋🏻‍♀️ Open to Roles

SOC Analyst L1  ·  Cybersecurity Analyst  ·  Network Engineer L1  ·  Vulnerability Analyst  ·  Information Security Analyst


📬 Get In Touch

📧 Email 💼 LinkedIn 🐙 GitHub ✍️ Medium
ramyaradjesh1@gmail.com ramya-radjesh ramyaradjesh @ramya15112000
🎯 TryHackMe 🤖 Reddit 🌐 Portfolio
ramyaradjesh Novel_Throat3177 ramyaradjesh.github.io

footer

⭐ If you find my work useful, feel free to star my repos — it means a lot!

Pinned Loading

  1. My-Cybersecurity-Projects- My-Cybersecurity-Projects- Public

    These projects are the foundational skills that I develop to serve as a good cybersecurity engineer.

    Python

  2. Docker-challenges---Pentest-Report Docker-challenges---Pentest-Report Public

    This report that holds the scope of solving 10 docker based security challenges. I planned to carry out the attack based on the vulnerable platforms and created a file that container that had DVWA,…

  3. VAPT VAPT Public

    The Vulnerability Assessment that was conduct and finding of vulnerability through : Port and service enumeration, OS & Configuration Discovery, Vulnerability Scanning(Networking), Web server Asses…

  4. Wazuh-Threat-detection-Project Wazuh-Threat-detection-Project Public

    In Progress Project: A lab-based SOC simulation using Wazuh SIEM/XDR to detect real-world attack scenarios including database exfiltration, credential theft, and insider enumeration across a virtua…

    1