Skip to content
View kushanbhagya's full-sized avatar

Block or report kushanbhagya

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kushanbhagya/README.md
╔═══════════════════════════════════════════════════════════════╗
β•‘  β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—        β•‘
β•‘  β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘        β•‘
β•‘  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘        β•‘
β•‘  β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘        β•‘
β•‘  β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘        β•‘
β•‘  β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β•β•β•        β•‘
β•‘                                                               β•‘
β•‘           [ SECURITY ENGINEER Β· PENTESTER Β· IR ]             β•‘
β•‘                  > Initializing profile...                    β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Typing SVG

Profile Views GitHub followers


> whoami

β”Œβ”€β”€(kushan@kali)-[~/profile]
└─$ cat about.txt

  Name        : Kushan Bhagya
  Role        : Cybersecurity Professional
  Education   : BSc (Hons) in Information Technology - Cyber Security βœ…  |  MSc Cybersecurity 🎯 
  Focus       : Penetration Testing Β· Incident Response Β· Security Engineering
  Current     : Building a Home Cyber & Network Lab πŸ”¬
  Philosophy  : "Security is not a product, but a process." β€” Bruce Schneier
  Status      : 🟒 Online | Studying · Building · Hacking (ethically)

> cat education.log

β”Œβ”€β”€(kushan@kali)-[~/education]
└─$ ls -lh

  [βœ… COMPLETED]  BSc (Hons) in Information Technology - Cyber Security
                  └─ Foundation in networks, ethical hacking,
                     digital forensics & security engineering

  [🎯 PLANNED]   MSc Cybersecurity
                  └─ Advanced research Β· Specialization in progress

> cat skills.sh

πŸ”΄ Offensive Security

Kali Linux Metasploit Burp Suite Nmap Wireshark OWASP

πŸ”΅ Defensive Security & IR

Splunk Elastic TheHive Suricata Wireshark

🟣 DevSecOps & Engineering

Docker GitHub Actions Linux Cisco VirtualBox

βš™οΈ Languages & Scripting

Python Bash PowerShell


> ls -la current_missions/

β”Œβ”€β”€(kushan@kali)-[~/missions]
└─$ ls -la

drwxr-xr-x  active_projects/
β”‚
β”œβ”€β”€ πŸ”¬ [BUILDING]  Home Cybersecurity & Network Lab
β”‚                  └─ Simulating real-world attack/defense scenarios
β”‚                     with VMs, firewalls, IDS/IPS & traffic analysis
β”‚
β”œβ”€β”€ πŸ›‘οΈ  [ACTIVE]   Security & Networking Projects
β”‚                  └─ Hands-on labs pushed to GitHub regularly
β”‚                     (pentesting, network configs, IR playbooks)
β”‚
β”œβ”€β”€ πŸ“‘ [STUDYING]  CCNA β€” Cisco Certified Network Associate
β”‚                  └─ Routing, switching, subnetting, network security
β”‚
└── πŸ” [STUDYING]  CompTIA Security+
                   └─ Threats, cryptography, identity management,
                      risk management & compliance

> cat certifications.txt

β”Œβ”€β”€(kushan@kali)-[~/certs]
└─$ cat progress.log

  [ ] CompTIA Security+        [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘]  IN PROGRESS πŸ“š
  [ ] CCNA (Cisco)             [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘β–‘]  IN PROGRESS πŸ“‘
  [🎯] CEH / OSCP              [β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘]  PLANNED
  [🎯] MSc Cybersecurity       [β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘]  PLANNED

  πŸ† Completed:
  [βœ…] BSc (Hons) in Information Technology - Cyber Security   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  ACHIEVED

> ./fetch_stats.sh

GitHub Stats

Top Languages

GitHub Streak


> cat activity_log.sh

GitHub Activity Graph


> ping --connect

β”Œβ”€β”€(kushan@kali)-[~/contact]
└─$ nmap -p "socials" --open Kushan

PORT          STATE   SERVICE
LinkedIn   β†’  OPEN    https://www.linkedin.com/in/kushan-bhagya/
YouTube    β†’  OPEN    https://www.youtube.com/@CyberLabDiaries
TryHackMe  β†’  OPEN    https://tryhackme.com/p/Cr00k3x
HackTheBox β†’  OPEN    https://app.hackthebox.com/profile/Cr00k3x
Email      β†’  OPEN    bhagyadilshan99@gmail.com

LinkedIn YouTube TryHackMe HackTheBox


╔══════════════════════════════════════════════════════════════╗
β•‘   "The quieter you become, the more you are able to hear."  β•‘
β•‘                                          β€” Kali Linux motto  β•‘
β•‘                                                              β•‘
β•‘    πŸ”¬ Lab always running. πŸ“š Always studying. πŸ’» Always      β•‘
β•‘       building. This GitHub grows with every project.        β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

πŸ” All opinions are my own. All hacking is authorized. ⭐ Star my repos if you find them useful β€” more projects coming soon!

Pinned Loading

  1. Cybersecurity-Home-Lab Cybersecurity-Home-Lab Public

    A hands-on cybersecurity home lab series covering networking, penetration testing, and SOC analysis using Kali Linux, Ubuntu, and Windows.

    1

  2. ISP-Project-w3scanner ISP-Project-w3scanner Public

    A Python Tkinter-based web security scanning GUI that combines WhatWeb, Nmap, and Nikto into one simple desktop application.

    Python 1

  3. 7phish 7phish Public

    A shell-scripted phishing simulation and awareness tool designed to demonstrate how phishing attacks work for cybersecurity education.

    Shell

  4. ML-based-Malicious-URL-Detector ML-based-Malicious-URL-Detector Public

    An end-to-end machine learning web application that detects whether a URL is safe or malicious. The project includes a React frontend for URL submission, a Flask backend API for prediction, and a t…

    Jupyter Notebook