Skip to content
View Alexander-50's full-sized avatar

Block or report Alexander-50

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Alexander-50/README.md

👋 Hey, I'm Alexander P.B.

typing


Operator Profile : AX-50

alexander@github:~$ cat /etc/operator_profile

op-profile

I break systems to understand them — and automate the parts humans shouldn’t repeat. to understand them — and automate the parts humans shouldn’t repeat.


🕶️ whoami

whoami


Domain Focus

• Web & Network Pentesting
• Recon Automation & Attack Surface Mapping
• ML-based Intrusion Detection (IoT / Network)
• Cloud Security (AWS) & Infrastructure Hardening
• Python Tooling for Security Engineering


🜃 Ops & Project Arsenal

🔍 IoT Anomaly-Based IDS (CICIoT23 — ML)

  • Automated end-to-end ML IDS pipeline
  • 99.76% accuracy on IoT attack dataset
  • Preprocessing → Training → Evaluation → Reporting

🛡️ Signature-Based IDS (Suricata + Docker)

  • Lightweight Suricata IDS cluster
  • Custom signatures for controlled attacks
  • Traffic replay + alert validation environment

📊 INSIGHTLOG — Log Analysis Framework

  • Multi-format parser
  • Rule-based detections + burst analysis
  • Flask dashboard (correlation, timelines, alerts)

⚙️ Network Vulnerability Manager (NVM)

  • Async port scanning + CPE mapping
  • NVD API CVE correlation
  • Auto-generated vulnerability intelligence

🔐 Linux Policy Auditor

  • CIS-aligned hardening checks
  • PAM & authentication policy audits
  • No external dependencies

📡 Port-Stat — Real-Time Port Monitor

  • Detects reverse shells, rogue services
  • Process correlation
  • JSON export for SIEM

💻 Tech Stack

A clean badge‑based stack — compact, visual, and relevant to your actual offensive security workflow.

🧠 Programming & Scripting

Python Java C++ Bash PowerShell

⚙️ Pentesting & Security Ops

Nmap BurpSuite Hydra Metasploit Gobuster Wireshark Tcpdump

🛡 Detection & Forensics

Suricata ELK Packet_Analysis Log_Analysis

☁️ Cloud & Infra

AWS Docker Linux Hardening

🤖 ML / Data (IDS R&D)

NumPy Pandas Scikit Matplotlib


📫 Connect

> LinkedIn : linkedin.com/in/alexander-pb
> GitHub   : github.com/Alexander-50
> TryHackMe: tryhackme.com/p/77mrx77
> Email    : pbalexander69@gmail.com

Pinned Loading

  1. CICIOT23-RandomForest-IDS CICIOT23-RandomForest-IDS Public

    An Anomaly-Based Intrusion Detection System (AIDS) built with a Random Forest classifier on the CICIOT23 dataset. This project automates the full ML pipeline to detect anomalous IoT network traffic…

    Python 4

  2. INSIGHTLOG INSIGHTLOG Public

    InsightLog is a full-featured log monitoring and detection framework with multi-format parsing, rule-based alerts, burst detection, correlation analysis, an interactive Flask dashboard, and executi…

    Python

  3. Linux-Policy-Auditor Linux-Policy-Auditor Public

    Python-based auditing tool that analyzes Linux authentication policies by parsing PAM configurations and login.defs. It detects password complexity, history, and aging rules, auto-identifies Debian…

    Python 1

  4. NVM NVM Public

    Network Vulnerability Manager (NVM): A fast, professional Python-based network assessment tool that performs threaded port scanning, service detection, and smart CPE mapping for precise CVE identif…

    Python

  5. Port-Stat Port-Stat Public

    Port-Stat is a lightweight Python tool that monitors your system for newly opened ports in real time. It detects changes, maps ports to processes, supports ignore lists, and offers optional JSON lo…

    Python

  6. vaishnavucv/cybersecurity-note vaishnavucv/cybersecurity-note Public

    notes

    152 83