Skip to content
View bruning-frighting's full-sized avatar

Block or report bruning-frighting

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bruning-frighting/README.md

Hi, I'm KAiZ3n 👋

🎓 Third-year Information Security student at PTIT (Posts and Telecommunications Institute of Technology)
💼 Aspiring SOC / Incident Response Engineer
⚙️ Hands-on experience in DFIR, Threat Hunting, Reverse Engineering, and Malware Analysis
📍 Based in Vietnam 🇻🇳 | Open for internship opportunities in SOC / Blue Team / DFIR

I have been sharpening my skills and knowledge through domestic and international CTF competitions, hands-on projects, and continuous learning.


👨‍💻 About Me

“Continuous improvement is Kaizen — I apply it in security, learning, and life.”

  • Practicing malware analysis (Covenant C2, InfoStealer, Valyria, BlackLotus)
  • Developing detection pipelines for C2 traffic, persistence artifacts, and memory forensics
  • Sharing research and notes at my KAiZ3n Blog
  • Always learning: Blue Team tactics, DFIR automation, and AI-assisted detection

Technical Skills

Domain Tools / Frameworks
Incident Response Volatility3, KAPE, pypykatz, Autopsy, DFIR-Orc
Network Analysis Suricata, Wireshark, NetworkMiner
Malware Analysis IDA Pro, Ghidra, x64dbg, PEStudio, YARA
Development Python, PowerShell, Bash, Go
Visualization / Reports Power BI, Jupyter Notebook
OS Environments Windows, Ubuntu Server, WSL2, VMware Workstation

📈 GitHub Stats

KAiZ3n's GitHub stats


CV & Contact


views


💡 I believe continuous learning and knowledge sharing are the keys to becoming better every day in cybersecurity.

🌐Socials

Facebook LinkedIn

💻Tech Stack

Go C C# C++ Java Python Cloudflare Notion Docker

📊GitHub Stats :



Pinned Loading

  1. DiscBackDoor DiscBackDoor Public

    This repository simulates a Discord-based C2 and demonstrates how to retrieve forensic artifacts from associated webhook URLs and bot tokens. It is intended strictly for educational and authorized …

    Go

  2. KAiZ3nThong KAiZ3nThong Public

    Astro

  3. MyChallenge MyChallenge Public

    This repository contains my development challenges in the DFIR and Malware Analysis categories.

  4. TrafficPaserC2Collection TrafficPaserC2Collection Public

    Tools for parsing and decrypting network traffic from various C2 frameworks (e.g., Meterpreter TLV, GunStager, InterStellarC2). Author: KAiZ3n | Contact: https://www.linkedin.com/in/thong-lam-5b352…

    Python