Skip to content
View yujin-xin's full-sized avatar

Block or report yujin-xin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
yujin-xin/README.md

Hello! I'm Yujin

In my free time / day off, I play CTFs, work on small cybersecurity projects, and write write-ups to improve my skills, which helps reinforce what I learn.

About me

  • 🎓 BS Information Technology - Data Networking
  • 🛡️ Network and Security Operation Center (present)

Skills

  • Networking: TCP/IP Stack, Routing and Switching
  • 🧠 Programming Languages: Python, JavaScript, Java, Bash, PowerShell
  • 🎯 Tools: SIEM (Wazuh, FortiSIEM, StellarCyber), EDR/XDR (Sophos XDR, Microsoft 365 Defender), Nessus (vulnerability assessment), FortiAnalyzer, FortiManager, Wireshark, VirtualBox/VMware
  • 🔍 Concepts: EDR/XDR, SIEM, Packet Analysis, Network Security, Threat Hunting, Automation

Projects

  • CTF Write-ups: (Ongoing) Solutions to Capture The Flag challenges focused on blue team operations
  • File Integrity Monitoring Web App: A web-based application using ExpressJs to monitor file changes and detect unauthorized modifications for security monitoring
  • SIEM Implementation - (Underdevelopment) Showcasing Wazuh for real-time log analysis, alerting, and threat analysis
  • IDS/IPS - (Underdevelopment) Building an IDS/IPS using Snort with custom rules for intrusion detection and prevention

Fun Fact

  • Sideline: I also like developing web applications and IoT systems, a passion I pursued as a sideline in college, which helped me quickly adapt to new technologies despite limited experience.
  • Beyond Academics: I like running, I do play instruments, and I like reading psychology and self-help books.

Pinned Loading

  1. FIM-Web-based FIM-Web-based Public

    File Integrity Monitoring application. A web based FIM tool that tracks modified files from base folder

    JavaScript

  2. IDS-for-MITM-attack IDS-for-MITM-attack Public

    A simple Python-based tool that demonstrates how eavesdropping works by detecting suspicious network activity commonly associated with MiTM attacks.

    Python

  3. File-integrity-monitoring File-integrity-monitoring Public

    CLI version of File Integrity Monitoring application. A portable python based FIM tool that tracks modified files from base folder

    Python

  4. slow-Loris-attack slow-Loris-attack Public

    A Python-based script that simulates a Slowloris Denial-of-Service attack by creating multiple threads that send slow, incomplete HTTP requests to overwhelm the target web server.

    Python