Skip to content
View Akash-Bhavsar's full-sized avatar

Block or report Akash-Bhavsar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Akash-Bhavsar/README.md
Typing SVG

LinkedIn HackTheBox Portfolio Email Profile Views


๐Ÿ” About Me

Application Security Consultant & Penetration Tester with 8+ years blending offensive security expertise with full-stack engineering. I uncover high-impact vulnerabilities, architect resilient systems, and build open-source security tooling that mirrors real-world attack scenarios.

  • OSCP+ Certified | Based in Melbourne, Australia ๐Ÿ‡ฆ๐Ÿ‡บ
  • Specializing in Web/API Pentesting, Cloud Security (AWS/GCP), and OT/ICS Security
  • Developer background in React, Node.js & Python gives me insight into how attackers exploit developer assumptions
  • Currently: Application Security Engineer @ Sydney Tools PTY LTD

โš”๏ธ Expertise

Offensive Security

  • Web & API Penetration Testing
  • OWASP Top 10 Exploitation
  • Burp Suite, Metasploit, Nmap
  • Threat Modeling (STRIDE)
  • Mobile & Thick Client Testing

Defensive Security

  • SIEM (Wazuh, ELK Stack, Splunk)
  • SOAR Automation & IR
  • IDS/IPS (Suricata, Snort)
  • MITRE ATT&CK Mapping
  • OT/ICS Security (IEC 62443)

Cloud & DevSecOps

  • AWS WAF, CloudFront, IAM
  • CI/CD Security (GitHub Actions)
  • SAST/DAST (Snyk, Trivy, SonarQube)
  • Docker & Kubernetes Hardening
  • Terraform, HashiCorp Vault

๐Ÿš€ Featured Projects

๐Ÿญ OT SOC-in-a-Box

A containerized Security Operations Center for industrial control systems (OT/ICS). Simulates a full Purdue Model environment with a 7-phase attack simulation, custom Suricata IDS rules, Wazuh correlation, and SOAR-driven automated response.

Mapped to: MITRE ATT&CK for ICS ยท NIST SP 800-82 ยท ISA/IEC 62443

Suricata Wazuh SOAR Docker OT/ICS

๐Ÿ›ก๏ธ Wazuh SOAR Automation

A Docker-based SIEM & SOAR platform integrating Wazuh Manager, OpenSearch, and a custom web dashboard. Features automated threat detection, host monitoring via Wazuh agents, and turnkey deployment with encrypted communications.

Wazuh OpenSearch SOAR Docker Security Automation

A honeypot solution pairing Dionaea with the ELK stack for real-time attack capture across HTTP, SMB, MySQL, FTP, Telnet and more. Generates live threat intelligence visualized through interactive Kibana dashboards.

Dionaea Elasticsearch Logstash Kibana Threat Intel

A production-grade AWS WAF deployment with 10 custom rules (SQLi, XSS, rate limiting, bot detection, geo-blocking, CSRF) in front of CloudFront. Auto-blocks malicious IPs and includes 30+ attack vector test suite via Python/boto3.

AWS WAF CloudFront CloudWatch CloudTrail Python boto3


๐Ÿ“Š GitHub Stats



๐Ÿ› ๏ธ Tech Arsenal

Security

Burp Suite Metasploit Wireshark Suricata Wazuh Nmap Kali Linux

Cloud & Infrastructure

AWS GCP Docker Kubernetes Terraform Ansible Cloudflare

Languages & Frameworks

Python TypeScript JavaScript React Node.js Shell

Monitoring & CI/CD

ELK Stack Splunk Grafana Prometheus GitHub Actions Jenkins


๐Ÿ† Certifications

OSCP+


Open to penetration testing engagements, AppSec consulting, and security research collaboration.

Pinned Loading

  1. WAF-Ops-Suite WAF-Ops-Suite Public

    Python 1

  2. ot-soc-in-a-box ot-soc-in-a-box Public

    Modula-3 1

  3. dionaea-stack dionaea-stack Public

    Python

  4. wazuh-soar-automation wazuh-soar-automation Public

    Shell

  5. Fastapi-app Fastapi-app Public

    Dockerfile 1

  6. task-manager task-manager Public

    TypeScript 1