Skip to content
View A9u3ybaCyb3r's full-sized avatar

Block or report A9u3ybaCyb3r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
A9u3ybaCyb3r/README.md

πŸ›‘οΈ Hello, I'm Bryan Vega

Cybersecurity enthusiast with hands-on lab experience in threat detection, digital forensics, SIEM tools, and ethical hacking. I enjoy solving complex security problems and building practical solutions in my home lab.

πŸ“‘ Table of Contents

πŸ‘¨β€πŸ’» About Me

πŸŽ“ I'm a graduate in Computer Management and Information Systems with a focus on Cybersecurity. I’ve built multiple blue/red team labs to simulate real-world attack and defense scenarios.

🧠 Passionate about staying ahead of threats, I apply MITRE ATT&CK, NIST IR plans, and real tools like Snort, LimaCharlie, and Splunk in daily practice.

πŸ” Currently seeking an entry-level cybersecurity analyst or SOC position to continue applying my detection, analysis, and incident response skills in a collaborative environment.


🧠 Hands-On Cyber Labs

Explore my hands-on cybersecurity practice through platform-based labs focused on ethical hacking, blue team detection, and digital forensics.

πŸ§ͺ Hack The Box (HTB)

πŸ”— View my HTB Profile

πŸ› οΈ Focus: Real-world exploitation, AD enumeration, Linux/Windows PrivEsc

πŸ’‘ Sample Boxes: Blue, Active, Knife


πŸŽ“ TryHackMe (THM)

πŸ”— View my TryHackMe Profile

πŸ›‘οΈ Focus: Blue Team training, SIEM usage, SOC scenarios

πŸ’‘ Notable Paths: Blue Team, SOC Level 1, Threat Detection


🧰 Skills

πŸ”§ Infrastructure & OS

Category Tools Used
Virtualization VirtualBox VMware
Identity Management Active Directory
Operating Systems Windows Linux

🌐 Networking & Monitoring

Category Tools Used
Firewalls / Segmentation pfSense
Packet Analysis Wireshark tcpdump

πŸ›‘οΈ Security Operations & Detection

Category Tools Used
SIEM & Log Analysis Splunk
Endpoint Detection & Response LimaCharlie Sysmon
Phishing Analysis PhishTool VirusTotal
Threat Intelligence MISP YARA
Forensics FTK Imager Volatility

πŸ•·οΈ Ethical Hacking & Testing

Category Tools Used
Vulnerability Scanning Nmap Nessus
Web App & AD Testing Burp Suite BloodHound
Penetration Platforms Metasploit Kali Linux

πŸ“œ Certifications

Issuer Certification Year
TCM Security Practical Junior Penetration Tester 2025
Google Cybersecurity Specialization 2024

πŸ“„ Certificates of Completion

Issuer Certificate Title
Forage Datacom Cybersecurity Job Simulation
TCM Security Security Operations (SOC) 101
TCM Security Open-Source Intelligence (OSINT) Fundamentals
TCM Security Practical Bug Bounty
TCM Security Practical Ethical Hacking

πŸ§ͺ CTF Participation

Event Skills Demonstrated Takeaway
King of Hackers WordPress enumeration, Google dorking, HackTricks Learned to assess CMS-based vulns under pressure

🧱 Projects

  • Goal: Simulate red team activities in a safe virtual environment
  • Tools: VirtualBox, pfSense, Kali, Metasploit, Nessus, AD Server
  • Outcome: Gained hands-on experience with vulnerability scanning, penetration testing, internal network pivoting, and report writing.
  • Goal: Practice threat detection and incident response using a Windows 10 victim machine
  • Tools: Splunk, LimaCharlie, Snort, Sysmon
  • Outcome: Used real-time logs to identify and correlate threat events following NIST IR standards.
  • Goal: Practice enterprise identity and access management using a simulated Active Directory environment
  • Tools: VirtualBox/VMware Workstation, Windows Server 2022, Windows 11, PowerShell
  • Outcome: Installed and configured a Domain Controller, joined a Windows 11 client to the domain, managed users, groups, and OUs, and enforced policies using GPOs, building practical skills in AD administration and access control.
  • Goal: Simulate a real-world IT Help Desk environment to understand and manage ticketing workflows
  • Tools: Docker, Peppermint, Terminal/Shell, Web Interface
  • Outcome: Deployed a containerized ticketing system and practiced ticket lifecycle management, escalation procedures, and support trend analysis, gaining hands-on experience transferable to platforms like ServiceNow and Zendesk.

Pinned Loading

  1. A9u3ybaCyb3r A9u3ybaCyb3r Public

  2. SOC-Phishing-Defense-Simulation SOC-Phishing-Defense-Simulation Public

    This controlled lab environment emphasizes practical cybersecurity skills, ethical practices, and the importance of proactive defense strategies.

    3

  3. Ethical-Hacking-Lab Ethical-Hacking-Lab Public

    The Virtual-Network-Penetration-Testing-Lab is a controlled environment designed for practicing security skills, including network security and penetration testing. By utilizing virtualization tech…

  4. zsh-history-sanitizer zsh-history-sanitizer Public

    A simple script to clean and sanitize your Zsh command history by removing non-readable entries, ensuring a tidy and secure .zsh_history file. The script renames the existing history file, extracts…

    Shell