Skip to content
View DarshakPatel2004's full-sized avatar

Highlights

  • Pro

Block or report DarshakPatel2004

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DarshakPatel2004/README.md

Typing SVG

Cybersecurity Engineer | Digital Forensics Researcher | ML/AI Security Specialist

Typing SVG

🛸 Active Intelligence Stream

VulnForge Status PhishScope Status Forensics Status


📍 Pune, Maharashtra, India | 📧 darshakpatel2004@gmail.com | 📱 +91-9823771052

Cisco CCST NFSU Cyber_First


📋 Executive Overview

🎯 Career Strategic Profile

  • Education: MSc Digital Forensics @ NFSU Delhi (2026)
  • Background: BTech CSE @ MIT ADT (GPA: 7.39/10)
  • Certification: Cisco CCST Cybersecurity
  • Domain: Threat Intelligence & DFIR Automation
  • Status: Final Year Researcher | Open for 2026 Roles

📊 Operational Metrics

  • PhishScope: 97% Accuracy (186K+ Dataset)
  • VulnForge: 342K+ CVE Intel Records
  • Investigations: 10+ High-Impact Case Files
  • Platform Depth: 5+ Operational Systems (Desktop/Mobile)

🛠️ Command Center

╭─────────────────────────────╮
│ Threat Intelligence         │
│ • CVE aggregation           │
│ • Automated rule gen        │
│ • Risk ranking              │
└─────────────────────────────┘
┌─────────────────────────────┐
│ Machine Learning Security   │
│ • Phishing detection        │
│ • Anomaly detection         │
└─────────────────────────────┘
┌─────────────────────────────┐
│ Digital Forensics           │
│ • Multi-OS analysis         │
│ • Evidence extraction       │
│ • Chain of custody          │
└─────────────────────────────┘

💼 Professional Experience

🔍 Cyber Security Intern

Cyber First Private Limited | November 2024 - May 2025 | Pune, Maharashtra

Domain: Digital Forensics & Cyber Incident Investigation

Accomplishments:

  • ✅ Conducted 10+ critical forensic investigations with comprehensive evidence analysis
  • ✅ Expertise across 5+ diverse operating systems (Windows, Linux, macOS, iOS, Android)
  • ✅ Extracted & analyzed digital evidence from 10+ computers & 10+ mobile devices
  • ✅ Applied advanced forensic techniques:
    • Memory dump analysis & RAM recovery
    • File system forensics & data carving
    • Mobile device extraction & analysis
    • Network traffic forensics
    • Malware triage & reverse engineering basics
    • Chain-of-custody documentation

Tools & Technologies Used:

┌─────────────────────────────────────────┐
│ Mobile Forensics Tools                  │
├─────────────────────────────────────────┤
│ • Cellebrite UFED → Device extraction   │
│ • Magnet Axiom → Multi-device analysis  │
│ • Oxygen Forensic Detective → Mobile    │
│ • Mobiledit Forensic Express → Analysis │
└─────────────────────────────────────────┘
┌─────────────────────────────────────────┐
│ Malware Analysis & Reverse Engineering  │
├─────────────────────────────────────────┤
│ • IDA Pro → Disassembly & debugging     │
│ • Ghidra → Binary analysis              │
│ • Burp Suite → Web vulnerability scan   │
└─────────────────────────────────────────┘
┌─────────────────────────────────────────┐
│ Network & SIEM Analysis                 │
├─────────────────────────────────────────┤
│ • Wireshark → Packet analysis           │
│ • NMap → Network reconnaissance         │
│ • Wazuh → SIEM & threat detection       │
└─────────────────────────────────────────┘

Impact:

  • Directly contributed to 10+ ongoing investigation processes
  • Demonstrated proficiency in multi-platform forensic analysis
  • Built strong foundation for evidence handling & documentation

🚀 Featured Projects

1. VulnForge 🔥 — Automated Threat Intelligence Platform

Timeline: April 2026 - Present | Status: Active Development

Problem Solved: CVE management is fragmented across multiple sources and requires manual updates. VulnForge automates threat intelligence aggregation, correlation, and rule generation.

System Architecture:

graph TD
    subgraph Source_Integration ["1. CVE Source Integration"]
        NVD[NVD - 342K+ Records]
        CISA[CISA KEV]
        OTX[AlienVault OTX]
        Dedupe[Unified Data Ingestion & Deduplication]
        
        NVD --> Dedupe
        CISA --> Dedupe
        OTX --> Dedupe
    end

    subgraph Sync_Engine ["2. Sync Engine & Scheduling"]
        Dedupe --> Sync[Sync Engine]
        Sched[APScheduler]
        Sched -->|Daily Full 02:00 UTC| Sync
        Sched -->|Hourly Incremental| Sync
    end

    subgraph Processing ["3. Intelligence Processing"]
        Sync --> Parsing[CVE Parsing]
        Parsing --> Linking[CPE String Linking]
        Linking --> Scoring[CVSS Scoring]
        
        Parsing --> Extraction[Metadata Extraction]
        Linking --> Asset[Asset Mapping]
        Scoring --> Risk[Risk Ranking]
        
        Extraction --> DB[(SQLite Database)]
        Asset --> DB
        Risk --> DB
    end

    subgraph Auto_Gen ["4. Detection Rule Auto-Gen"]
        DB --> RuleGen[Detection Rule Generator]
        RuleGen --> Snort[Snort/Suricata]
        RuleGen --> Sigma[Sigma SIEM]
        RuleGen --> JSON[JSON Alert Templates]
        
        Snort & Sigma & JSON --> Export[Single-Click Export]
        Export --> Prod[Prod-Ready Rules]
    end

    subgraph Dashboard ["5. Real-Time Dashboard"]
        Prod --> Dash[Operational Dashboard]
        Dash --> Timeline[Timeline View]
        Dash --> Map[Vulnerability Map]
        Dash --> Alerts[Critical Alerts]
    end

    style NVD fill:#1f6feb,stroke:#58a6ff,color:#fff
    style DB fill:#0d1117,stroke:#58a6ff,color:#fff
    style Prod fill:#238636,stroke:#3fb950,color:#fff
    style Sync fill:#161b22,stroke:#58a6ff,color:#fff
    style Dedupe fill:#161b22,stroke:#58a6ff,color:#fff
    style RuleGen fill:#161b22,stroke:#58a6ff,color:#fff
    style Dash fill:#161b22,stroke:#58a6ff,color:#fff
    
    style Source_Integration fill:#0d1117,stroke:#30363d,color:#fff
    style Sync_Engine fill:#0d1117,stroke:#30363d,color:#fff
    style Processing fill:#0d1117,stroke:#30363d,color:#fff
    style Auto_Gen fill:#0d1117,stroke:#30363d,color:#fff
    style Dashboard fill:#0d1117,stroke:#30363d,color:#fff
Loading
View Classic Architectural Model
┌──────────────────────────────────────────────────────────────────┐
│                     CVE SOURCE INTEGRATION                        │
├──────────────────────────────────────────────────────────────────┤
│                                                                  │
│  NVD (342K+ Records)  ──┐                                        │
│                         ├─→ Unified Data Ingestion ──┐           │
│  CISA KEV  ─────────────┤   & Deduplication         │           │
│                         ├─→                          ├─→ ┌────┐  │
│  AlienVault OTX  ───────┘                           │   │SYNC│  │
│                                                      └──→│ENG │  │
│                                                         └────┘  │
│                                                          ↓      │
│                                  ┌──────────────────────────┐  │
│                                  │  APScheduler            │  │
│                                  ├──────────────────────────┤  │
│                                  │ Daily Full: 02:00 UTC   │  │
│                                  │ Hourly Inc: Every hour  │  │
│                                  │ (Zero manual labor)      │  │
│                                  └──────────────────────────┘  │
└──────────────────────────────────────────────────────────────────┘
                                   ↓
┌──────────────────────────────────────────────────────────────────┐
│                  INTELLIGENCE PROCESSING                          │
├──────────────────────────────────────────────────────────────────┤
│                                                                  │
│  CVE Parsing  →  CPE String Linking  →  CVSS Scoring           │
│       ↓                ↓                     ↓                   │
│  Metadata Extraction → Asset Mapping → Risk Ranking             │
│                                                                  │
│  Output: Structured CVE Intelligence in SQLite Database         │
└──────────────────────────────────────────────────────────────────┘
                                   ↓
┌──────────────────────────────────────────────────────────────────┐
│              DETECTION RULE AUTO-GENERATION                      │
├──────────────────────────────────────────────────────────────────┤
│                                                                  │
│  Format 1: Snort/Suricata Rules    →  IDS Deployment           │
│  Format 2: Sigma SIEM Rules        →  SIEM Integration         │
│  Format 3: JSON Alert Templates    →  Custom Tools              │
│                                                                  │
│  Single-Click Export → Prod-Ready Rules                         │
└──────────────────────────────────────────────────────────────────┘
                                   ↓
┌──────────────────────────────────────────────────────────────────┐
│                    REAL-TIME DASHBOARD                           │
├──────────────────────────────────────────────────────────────────┤
│                                                                  │
│ • CVE Timeline View    • Asset Vulnerability Map               │
│ • Critical Alerts      • Trend Analysis                         │
│ • Rule Generation Log  • Export History                         │
└──────────────────────────────────────────────────────────────────┘

Key Features:

Feature Details
Data Sources NVD, CISA KEV, AlienVault OTX (3 integrated feeds)
Database Size 342,000+ CVE records aggregated
Update Schedule Daily full sync @ 02:00 UTC + Hourly incremental
Asset Tracking CPE-to-infrastructure mapping & auto-discovery
Rule Generation 3 formats: Snort/Suricata, Sigma, JSON
Deployment Single-click export, production-ready

Tech Stack:

Backend:      Python • FastAPI • SQLite
Frontend:     React 18 • Vite
Scheduling:   APScheduler (for automated syncs)
Deployment:   Docker-ready architecture
Database:     Append-only SQLite design

Metrics:

  • Zero manual updates (fully automated)
  • 📊 342K+ CVEs in unified database
  • 🎯 3 output formats for multi-tool support
  • 🔄 2 sync schedules for data freshness

2. PhishScope 🎯 — ML-Powered Phishing Detection Engine

Timeline: January 2026 - Present | Status: Development + Deployment

Problem Solved: Phishing URLs evade traditional regex-based detection. PhishScope uses engineered features and ensemble ML to achieve 97% accuracy on real-world datasets.

Technical Architecture:

graph LR
    URL[URL Input] --> FE[Feature Engineering]
    FE --> Structural[Structural Features]
    FE --> Lexical[Lexical Features]
    FE --> Brand[Brand Similarity]

    Structural --> TFIDF[TF-IDF Vectorization]
    Lexical --> TFIDF
    Brand --> TFIDF

    TFIDF --> Ensemble{Ensemble Model}
    
    subgraph Models
        LR[LR Classifier]
        RF[Random Forest]
        XGB[XGBoost]
    end

    Ensemble --> Models
    Models --> Vote[Hard Voting]
    Vote --> Result[Prediction Result]

    style URL fill:#f96,stroke:#333,stroke-width:2px
    style FE fill:#bbf,stroke:#333,stroke-width:2px
    style Models fill:#dfd,stroke:#333,stroke-width:2px
    style Result fill:#f66,stroke:#333,stroke-width:2px
Loading
View Classic Diagnostic Architecture
PHISHING URL INPUT
       ↓
┌──────────────────────────────────────────┐
│  FEATURE ENGINEERING PIPELINE             │
├──────────────────────────────────────────┤
│                                          │
│ STRUCTURAL FEATURES (12 features):       │
│ • URL length & depth                    │
│ • Subdomain count & entropy             │
│ • Query parameter count                 │
│ • Fragment & scheme analysis            │
│ • Domain name structure                 │
│                                          │
│ LEXICAL FEATURES (8 features):          │
│ • Digit ratio & special char ratio     │
│ • Entropy & entropy variance            │
│ • Alphabetic character distribution     │
│ • Character set analysis                │
│                                          │
│ BRAND SIMILARITY (3+ features):         │
│ • Levenshtein distance scoring          │
│ • Known brand database matching         │
│ • TLD reputation scoring                │
│ • Homograph attack detection            │
│                                          │
│ Total: 20+ Engineered Features          │
└──────────────────────────────────────────┘
       ↓
┌──────────────────────────────────────────┐
│  TF-IDF VECTORIZATION                    │
├──────────────────────────────────────────┤
│ • Character n-gram analysis (2-grams)    │
│ • Term frequency weighting               │
│ • Feature normalization                  │
└──────────────────────────────────────────┘
       ↓
┌──────────────────────────────────────────┐
│  ENSEMBLE ML CLASSIFICATION               │
├──────────────────────────────────────────┤
│                                          │
│ Model 1: Logistic Regression            │
│ ├─ Probability: Phishing vs Legitimate  │
│ ├─ Confidence score                     │
│ └─ Fast inference                       │
│                                          │
│ Model 2: Random Forest (100 trees)      │
│ ├─ Feature importance ranking           │
│ ├─ Robust to outliers                   │
│ └─ Ensemble voting                      │
│                                          │
│ Model 3: XGBoost Gradient Booster       │
│ ├─ Gradient boosted decision trees      │
│ ├─ High precision tuning                │
│ └─ Best single model accuracy           │
│                                          │
│ VOTING STRATEGY:                        │
│ Hard voting (majority) for final output │
│                                          │
└──────────────────────────────────────────┘
       ↓
┌──────────────────────────────────────────┐
│  PREDICTION OUTPUT                       │
├──────────────────────────────────────────┤
│                                          │
│ Classification: Phishing OR Legitimate  │
│ Confidence Score: 0.0 - 1.0             │
│ Model Votes: (LR, RF, XGB)              │
│ Feature Importance: Top 5 features      │
│ Reasoning: Explainability               │
│                                          │
└──────────────────────────────────────────┘

Performance Metrics:

Metric Score
Accuracy 97% ✓
Precision 0.97 (Low false positives)
Recall 0.97 (Catches true cases)
F1-Score 0.97 (Balanced performance)
Training Data 186,230+ URLs
Test Dataset Balanced phishing & legitimate URLs

User Interface & Deployment:

┌──────────────────────────────────────────┐
│           STREAMLIT DASHBOARD            │
├──────────────────────────────────────────┤
│                                          │
│ 📋 BATCH PROCESSING:                     │
│  • Upload CSV with URLs                  │
│  • Process 100+ URLs in seconds          │
│  • Export results to JSON                │
│                                          │
│ 🔍 SINGLE URL CLASSIFICATION:            │
│  • Real-time inference                   │
│  • Confidence visualization              │
│  • Model vote breakdown                  │
│                                          │
│ 📊 SOC CONTROL SIDEBAR:                  │
│  • Statistics & metrics                  │
│  • Historical data                       │
│  • Export options                        │
│                                          │
│ 💾 JSON EXPORT:                          │
│  • Structured output format              │
│  • Integration-ready                     │
│  • Timestamped results                   │
│                                          │
└──────────────────────────────────────────┘

Tech Stack:

ML Frameworks:  Scikit-learn • XGBoost • TensorFlow
Data Processing: Pandas • NumPy
NLP/Text:       NLTK • TF-IDF vectorization
Frontend:       Streamlit (interactive dashboard)
Data Format:    CSV input / JSON output

Key Metrics:

  • 🎯 97% Accuracy on 186K+ URL dataset
  • 📊 20+ Features engineered
  • Real-time inference (< 100ms per URL)
  • 📈 Ensemble approach for robustness
  • 💾 Production-ready API & dashboard

🎓 Education & Certifications

👨‍🎓 MSc Digital Forensics & Information Security

National Forensics Science University, Delhi | Graduation: 2026

Specialized Coursework Completed:

Core Competencies:

  • Network Security & Cryptography (AES, RSA, ECC)
  • Digital Evidence Collection & Analysis
  • SIEM Log Correlation & Threat Detection
  • OWASP Top 10 Vulnerability Classes
  • CVSS 3.1 Severity Scoring
  • IT Act 2000 Legal Framework & Compliance
  • Incident Response & Threat Hunting

🎓 Bachelor of Technology — Computer Science & Engineering

MIT ADT University, Pune | Graduation: 2025 | GPA: 7.39/10

Specialization: Cyber Security and Forensics

Key Subjects:

  • Penetration Testing & Vulnerability Assessment
  • Cryptography & Network Security Fundamentals
  • Ethical Hacking & Information Warfare
  • Digital Forensics Fundamentals
  • System & Network Administration
  • Secure Software Development

🏆 Cisco Certified Support Technician (CCST) — Cybersecurity

Cisco | Certification Year: 2025

Validates:

  • Network security fundamentals
  • Threat identification & analysis
  • Security tools & technologies
  • Incident response basics
  • Security best practices

💻 Technical Intelligence Matrix

Tip

I specialize in the intersection of Artificial Intelligence and Cybersecurity Operations, focusing on automating threat detection pipelines.

🛠 Core Engineering Stack

Sector Technologies
Languages Python JavaScript Bash Java
Backend FastAPI PostgreSQL SQLite Docker
Forensics Cellebrite UFEDMagnet AxiomOxygen ForensicIDA ProGhidra
ML & AI TensorFlow PyTorch Scikit-learn XGBoost
AppSec Burp SuiteWiresharkNMapWazuh (SIEM)OWASP Testing
Frontend React Streamlit Vite

Important

Seeking Opportunities: I am currently open to Fall 2026 internships and full-time roles in Threat Intel, DFIR, and Security Data Science.


📊 GitHub Analytics & Contributions

Total Contributions Longest Streak Member Since


Python JavaScript Bash Java


🏆 Achievements & Recognition

Cisco CCST Forensics ML Project CVE Intel MSc Research


🎯 Current Objectives (2026)

💼 Career Trajectory

  • MS in Cybersecurity: Actively preparing for advanced studies in US/UK/EU (Fall 2026).
  • Security Research: Seeking roles in Threat Intelligence, DFIR, or Security Automation.
  • Certifications: Pursuing OSCP and EC-Council specialized credentials.

🤝 Open for Collaboration

  • Developing open-source threat intelligence modules.
  • Open Research: Exploring automated DFIR workflows.

💬 Let's Discuss

  • Advanced threat detection & response
  • Forensics workflow automation
  • ML model selection for security
  • Emerging security technologies
  • Career development in cybersecurity

🌐 Connect With Me

Discord LinkedIn GitHub Twitter Reddit Instagram Email


Let's Build Secure Systems Together! 🚀

Profile Views

Made with ❤️ by a Cybersecurity Enthusiast

"Security is not a feature. It's a foundation for trust."

April 2026 | Driven by Curiosity & Innovation

Popular repositories Loading

  1. PhishScope PhishScope Public

    Make use of different ML Models to perform analysis

    Jupyter Notebook

  2. VulnForge VulnForge Public

    Python

  3. DarshakPatel2004 DarshakPatel2004 Public