Skip to content
View ibfavas's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ibfavas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ibfavas/README.md

Hi πŸ‘‹, I'm MOHAMMAD FAVAS S

πŸ” Cybersecurity Researcher | Bug Bounty Hunter | VAPT Enthusiast

πŸ“ Kerala, India β€’ Focus: Web Exploitation & Bug Bounty Hunting

Breaking web applications, one assumption at a time.


πŸ‘¨β€πŸ’» About Me

  • πŸ” Cybersecurity enthusiast focused on Web & Network Security
  • πŸ§ͺ Strong hands-on experience with labs, attack simulations & system hardening
  • ⚑ Interested in SSRF, IDOR, RCE, Privilege Escalation
  • 🧩 Approach: Understand systems deeply β†’ break them β†’ secure them

βš’οΈ Core Expertise

  • 🌐 Web Application Security Testing (VAPT)
  • πŸ” Reconnaissance & Attack Surface Mapping
  • πŸ§ͺ Exploit Development & PoC Creation
  • πŸ›‘οΈ Linux System Hardening & Secure Configurations
  • πŸ“‘ Network Analysis & Traffic Inspection

πŸ› οΈ Tools & Technologies


πŸ§ͺ Security Labs & Research

πŸ” Virtualized Attack & Defense Lab

  • Built a multi-node lab using Hyper-V
  • Simulated real-world attack scenarios (Kali vs Metasploitable2)
  • Configured network isolation to prevent traffic leakage
  • Implemented system hardening (SSH keys, UFW, non-root access)

🏰 Vulnerable Machine Development (Infinity Castle)

  • Designed intentionally vulnerable environment for hands-on exploitation
  • Practiced web attacks using Burp Suite (interception & manipulation)
  • Integrated credential extraction challenges (Hashcat, Steganography)
  • Simulated privilege escalation paths and misconfigurations

πŸ›‘οΈ System Hardening & Security Practices

  • Applied Linux system hardening techniques
  • Secured environments using firewall rules (UFW)
  • Configured secure authentication mechanisms (SSH key-based access)

🎯 Current Focus

  • πŸ” Advanced Bug Bounty Hunting
  • ⚑ Exploit chaining (multi-step vulnerabilities)
  • 🧠 Deep dive into API Security & Logic Flaws
  • πŸ›‘οΈ Blue Team basics (SOC workflows & detection)

πŸ“ˆ Activity Graph


🧠 Certifications & Learning

  • πŸ›‘οΈ Certified SOC Analyst (CSA)
  • πŸ” Certified in Cybersecurity (ISC2)
  • πŸ§ͺ TryHackMe – Jr Penetration Tester Path

πŸ“« Connect With Me


⚑ Mindset

"Security is not about tools. It's about understanding systems well enough to break assumptions."

Popular repositories Loading

  1. ibfavas ibfavas Public

    Config files for my GitHub profile.

  2. Smart-Recipe-Finder Smart-Recipe-Finder Public

    A Smart Recipe Finder Application that empowers users to discover recipes based on the ingredients they have on hand. This project demonstrates a full-stack implementation with a focus on creating …

    CSS 1

  3. Sentinal-X Sentinal-X Public

    Sentinel-X is an advanced anti-theft Android app with face recognition and a fake shutdown feature to prevent unauthorized power-offs. It captures intruder images and sends alerts via Telegram for …

    Kotlin 1

  4. C-Sharp-Programs C-Sharp-Programs Public

    C#

  5. QuestronBot QuestronBot Public

    This is a Telegram bot that generates AI-powered responses using the Segmind GPT-4o API. The bot listens to user messages and replies with AI-generated responses. It also includes features such as …

    Python

  6. Web-Watchdog Web-Watchdog Public

    Web Watchdog is a simple browser extension designed to monitor and alert users when websites attempt to access sensitive information such as usernames, passwords, API keys, and tracking data. It pr…