Skip to content
View calghar's full-sized avatar

Organizations

@dynatrace-oss

Block or report calghar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
calghar/README.md
Header - Farooq Shaikh, Security Researcher

Typing SVG


LinkedIn Google Scholar Blog Dynatrace OSS


πŸ‘‹ About Me

Security Researcher at Dynatrace specializing in cloud native security and runtime threat detection.

  • 🎯 Focus Areas: Vulnerability Analysis, Kubernetes Security, Runtime Detection, AI/ML for Threat Detection
  • πŸ› οΈ Daily Tools: Kubernetes, Tetragon, Python, Go, eBPF
  • πŸ”¬ Research: Identity Attacks, IoT Security, Container Security, Exploitation Frameworks
  • πŸ’» Current Work: Building open source security tools, cloud threat detection systems, vulnerability testing frameworks
  • 🌱 Contributing: Cilium Tetragon ecosystem, cloud security projects

πŸš€ Featured Projects

crypto-jack-agent tetragon-mcp

k8s-exploit-toolkit gh-account-switcher


Wave Latest Blog Posts

Container misconfigurations – From theory to exploitation

Practical exploration of container vulnerabilities and exploitation techniques

October 2025

Kubernetes misconfiguration attack paths

Attack vectors stemming from K8s misconfigurations and defensive approaches

April 2025

Understanding Kubernetes security misconfigurations

Foundation of Kubernetes configuration security issues

April 2025

Apache Struts CVE-2024-53677 Analysis

Vulnerability analysis and detection indicators

February 2025

View All Posts


πŸ“š Publications & Patents

πŸ“„ Key Publications πŸ” Patent Portfolio
Machine Learning Model for Classifying Unsolicited IoT Devices
14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018
System and Method for Cybersecurity Reconnaissance, Analysis, and Score Generation
US Patent 11,297,109 Β· 11,924,251 Β· 12,335,317
Internet of Malicious Things: Correlating Active and Passive Measurements
IEEE Communications Magazine, Vol. 56(9), pp. 170-177, 2018
Detecting and Mitigating Golden SAML Attacks Against Federated Services
US Patent 11,552,968 Β· 11,818,150
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution
IEEE/IFIP Network Operations and Management Symposium (NOMS), 2023
Cybersecurity Analysis and Protection Using Distributed Systems
US Patent 11,968,235 Β· 12,267,369

Google Scholar


πŸ› οΈ Technology Stack

Go Python C Bash eBPF

Kubernetes Docker Cilium Linux

TensorFlow PyTorch Tetragon AWS GCP


πŸ“Š GitHub Statistics

GitHub Stats Top Languages


πŸ“ˆ Contribution Activity

Contribution Activity Graph


πŸ’¬ Open to collaborations on security research and cloud native security projects

Footer

Popular repositories Loading

  1. crypto-jack-agent crypto-jack-agent Public

    Detect CryptoJacking attacks

    Python

  2. gh-account-switcher gh-account-switcher Public

    Tool for quickly switching between multiple GitHub accounts

    Go

  3. tetragon tetragon Public

    Forked from cilium/tetragon

    eBPF-based Security Observability and Runtime Enforcement

    C

  4. koney koney Public

    Forked from dynatrace-oss/koney

    Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and…

    Go

  5. dotfiles dotfiles Public

    Personal configuration setup

    Shell

  6. tetragon-mcp tetragon-mcp Public

    MCP server implementation for Tetragon

    Go