Skip to content
View yujin-xin's full-sized avatar

Block or report yujin-xin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
yujin-xin/README.md

Hello! I'm Yujin👋

I'm an aspiring Security Analyst. I’m currently learning in the field, playing CTFs, and building cybersecurity related projects to deepen my skills, especially in blue team operations.

About me

  • 🎓 BS Information Technology - Data Networking
  • 🌱 Studying cybersecurity - Focus on security operation and threat detection
  • 👾 Security Framework - MITRE ATT&CK

Skills

  • Networking: TCP/IP Stack, Routing and Switching, Packet Analysis
  • 🧠 Programming Languages: Python, JavaScript, Java, Bash, PowerShell
  • 🎯 Tools: Wazuh (SIEM), Snort (IDS/IPS), Nessus (vulnerability assessment), Wireshark, Nmap, VirtualBox/VMware
  • 🔍 Concepts: Intrusion Detection, Log Analysis, Network Security, Threat Hunting, Automation

Projects

  • CTF Write-ups: (Ongoing) Solutions to Capture The Flag challenges focused on blue team operations
  • File Integrity Monitoring Web App: A web-based application using ExpressJs to monitor file changes and detect unauthorized modifications for security monitoring
  • SIEM Implementation - (Underdevelopment) Showcasing Wazuh for real-time log analysis, alerting, and threat analysis
  • IDS/IPS - (Underdevelopment) Building an IDS/IPS using Snort with custom rules for intrusion detection and prevention

Fun Fact

  • Sideline: I also like developing web applications and IoT systems, a passion I pursued as a sideline in college, which helped me quickly adapt to new technologies despite limited experience.
  • Beyond Academics: I like running, I do play instruments, and I like reading psychology and self-help books.

Pinned Loading

  1. FIM-Web-based FIM-Web-based Public

    File Integrity Monitoring application. A web based FIM tool that tracks modified files from base folder

    JavaScript

  2. IDS-for-MITM-attack IDS-for-MITM-attack Public

    A simple Python-based tool that demonstrates how eavesdropping works by detecting suspicious network activity commonly associated with MiTM attacks.

    Python

  3. File-integrity-monitoring File-integrity-monitoring Public

    CLI version of File Integrity Monitoring application. A portable python based FIM tool that tracks modified files from base folder

    Python

  4. slow-Loris-attack slow-Loris-attack Public

    A Python-based script that simulates a Slowloris Denial-of-Service attack by creating multiple threads that send slow, incomplete HTTP requests to overwhelm the target web server.

    Python