class AkashWaris:
role = "Web Application Security Tester · Network Security "
university = "FAST NUCES Islamabad | B.S. Cybersecurity (2023–2027)"
certs = ["CompTIA Pentest+", "Jr. Penetration Tester"]
team = "Binary_Beasts (CTF)"
thm_rank = "Top 1% globally"
focus = [
"Web App Penetration Testing",
"OWASP Top 10 Exploitation",
"AI-Powered Security Tooling",
"Cryptography & Steganography",
"DFIR & Network Forensics"
]
philosophy = "Break → Document → Automate → Teach"| Languages |
|
| Pentest / Offensive |
|
| Crypto / Stego |
|
| Forensics / DFIR |
|
| Cracking |
|
AI-driven malware analysis that cuts triage time from hours to seconds.
ThreatLens ingests suspicious samples, runs multi-signal behavioral analysis, and surfaces actionable threat intelligence — built to accelerate real analyst workflows. Designed with a modular, extensible architecture so new detection signals can be plugged in without touching core logic.
Released: v2.0 "Swarm Protocol" on GitHub
Key Capabilities
├── Multi-signal behavioral analysis
├── AI-generated threat summaries
├── Modular detection architecture
└── Analyst-first output formatting (JSON + Markdown)
I actively compete in CTFs with team Binary_Beasts — writeups at waris206.github.io/Binary_Beasts-CTF-Writeups.
| Platform / Event | Category Focus | Notes |
|---|---|---|
| 🎯 CTF | Web · Crypto · Forensics | Foundation grinding |
| 🇺🇸 US Cyber Games | Full spectrum | Competitive season |
| ♾️ Hackfinity CTF | Multi-category | — |
| 🏭 Industrial Intrusion CTF | ICS / OT Security | — |
| Goal | Status | Notes |
|---|---|---|
| ThreatLens v3 — expanded detection coverage | 🟢 Active | New signal sources + improved scoring |
- 🛠️ Building lightweight security tooling
- 🚩 Joint CTF participation
- 📝 Writing / reviewing security content
- 🔬 Research (enumeration, obfuscation, detection)
Open an issue or drop an email.
| Channel | Handle |
|---|---|
| akashwaris.cybersec@gmail.com | |
| Muhammad Akash Waris | |
| 🔴 TryHackMe | XORgeist |
⚖️ Ethics & Disclaimer
All activities I conduct are within legal and ethical boundaries. Content here is for educational and defensive security purposes only. Never test systems without explicit written authorization.