GitHunt

Mike T.

usrtem

Aspiring Cybersecurity Analyst | B.S. Cyber Ops (Utica) | Malware • AI • Forensics • Risk | CTF Lead | Open to roles in SOC, Threat Intel, or DFIR

Languages

Python67%HTML33%

Repos

15

Stars

19

Forks

2

Top Language

Python

Loading contributions...

Top Repositories

Repositories

15
US
usrtem/Conti-Leak-Analysis

In-depth analysis of the Conti ransomware gang based on their leaked internal Jabber chat logs. Includes organizational structure, operational tactics, key actors, and negotiation strategies.

62Updated 9 months ago
adversary-emulationcobalt-strikeconticyber-threat-intelligencecybercrimejabberleak-analysismalware-analysismitre-attackransomware
US
usrtem/README

This is an overview of my portfolio with my repositories.

10Updated 7 months ago
US
usrtem/QuickResources

I like to play with html, so I created a favorites list, never ending and not completely inclusive, of some of my favorite cyber resources.

HTML10Updated 1 year ago
US
usrtem/AI-Cybersecurity-Research

White-paper & talk covering benefits, risks, and mitigation frameworks for AI and LLMs in cybersecurity (NIST AI RMF, OWASP Top 10 for LLMs, MITRE ATLAS, real-world case studies)

10Updated 9 months ago
ai-securityartificial-intelligencecyber-threat-intelligencecybersecuritydata-poisoninglarge-language-modelsllm-vulnerabilitiesmitre-atlasnist-ai-rmfowaspprompt-injection
US
usrtem/SimplePort

Python-based TCP port scanner with customizable ranges, service detection, real-time output, and timestamped logging — built for ethical security testing and training.

Python10Updated 9 months ago
cli-toolcybersecuritycybersecurity-toolsethical-hackingnetwork-toolspenetration-testingport-scannerportscanportscannerpythonsocket-programmingsysadmin-tools
US
usrtem/ResearchAI

AI-powered document analysis tool for querying content across PDFs, Word files, Excel sheets, text files, and web URLs using Google’s Gemini API.

Python10Updated 9 months ago
artificial-intelligencedocument-analysisgemini-apigenerative-aillmnatural-language-processingpdf-processingpythonresearch-toolstkinter
US
usrtem/Malware-Classification-Qilin

Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.

10Updated 9 months ago
backdoorsbotnetscyber-threat-intelligencecybercrimekeyloggersmalware-analysismitre-attackpowershellqilinransomwarewindows-security
US
usrtem/Digital-Forensics-Labwork

A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.

10Updated 9 months ago
auditdbash-artifactscrondigital-forensicse3forensic-analysisftk-imagerincident-responselinux-forensicsmactimemobile-forensicsshell-historysleuthkitsteganalysistimeline-analysis
US
usrtem/Cyber-Risk-Management-Plan

A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.

10Updated 9 months ago
controlscyber-governance-insightmitigationnistnist-800-30nist-800-53nist800-53risk-managementthreat-assessment
US
usrtem/Static-Malware-Analysis

This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.

10Updated 9 months ago
cybersecurityemotethybrid-analysiskeyloggermalware-analysismitre-attackpestudioremnuxstatic-analysisvirustotal
US
usrtem/LokiBot-Malware-Analysis

Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.

10Updated 9 months ago
cyber-threat-intelligenceflarevmhybrid-analysiskeyloggerlokibotmalware-analysismitre-attackprocess-injectionremnuxstatic-analysisvirustotal
US
usrtem/Malware-Network-Analysis

PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.

10Updated 9 months ago
dns-analysishttp-postmalware-analysismitre-attacknetwork-forensicspcap-analysisremnuxtls-analysiswiresharkword-dropper
US
usrtem/Cyber-Incident-Alert-Breach

Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.

10Updated 9 months ago
alert-systemcyber-awarenessincident-responsemalware-removalpkiremote-accesssiem-toolssocial-engineeringtrojanuniversity-breach
US
usrtem/TrickBot-Analysis

In-depth malware research report analyzing TrickBot's evolution from a banking trojan to a modular threat tool used in ransomware campaigns. Covers threat actor attribution, MITRE ATT&CK mapping, propagation techniques, and defensive strategies.

10Updated 9 months ago
banking-trojanc2-infrastructureconticyber-threat-intelligencecyber-threatsmalware-analysismitre-attackphishingransomwarereverse-engineeringryuksmb-exploitationtrickbot
US
usrtem/course-highlights

Summary of key cybersecurity, programming, and digital forensics courses completed at Utica University as part of the B.S. in Cybersecurity (Cyber Operations). Highlights include AI security, OSINT, malware analysis, and applied risk management using NIST frameworks.

00Updated 9 months ago
ai-securitycourseworkcyber-operationscybersecuritydigital-forensicseducationmalware-analysisnistosintpython-programmingutica-university

Gists

Recent Activity

Mike T. (usrtem) | GitHunt