Skip to content
View usrtem's full-sized avatar

Block or report usrtem

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

This is an overview of my portfolio with my repositories.

1 Updated Aug 8, 2025

I like to play with html, so I created a favorites list, never ending and not completely inclusive, of some of my favorite cyber resources.

HTML 1 Updated Jul 8, 2024

White-paper & talk covering benefits, risks, and mitigation frameworks for AI and LLMs in cybersecurity (NIST AI RMF, OWASP Top 10 for LLMs, MITRE ATLAS, real-world case studies)

1 Updated Jun 18, 2025

Python-based TCP port scanner with customizable ranges, service detection, real-time output, and timestamped logging — built for ethical security testing and training.

Python 1 Updated Jun 18, 2025

AI-powered document analysis tool for querying content across PDFs, Word files, Excel sheets, text files, and web URLs using Google’s Gemini API.

Python 1 Updated Jun 18, 2025

In-depth analysis of the Conti ransomware gang based on their leaked internal Jabber chat logs. Includes organizational structure, operational tactics, key actors, and negotiation strategies.

1 Updated Jun 18, 2025

Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.

1 Updated Jun 18, 2025

A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.

1 Updated Jun 18, 2025

A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and co…

1 Updated Jun 18, 2025

This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.

1 Updated Jun 18, 2025

Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.

1 Updated Jun 18, 2025

PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.

1 Updated Jun 18, 2025

Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrate…

1 Updated Jun 18, 2025

In-depth malware research report analyzing TrickBot's evolution from a banking trojan to a modular threat tool used in ransomware campaigns. Covers threat actor attribution, MITRE ATT&CK mapping, p…

1 Updated Jun 18, 2025