online|~/vraj_
$cd~$catabout.md$ls./projects$whatis--skills$tail-f blog.log$sshcontact@vraj
$cd~
$catabout.md
$ls./projects
$whatis--skills
$tail-f blog.log
$sshcontact@vraj
$tail-f blog.log

Blog & Writeups_

Thoughts on cybersecurity, tutorials, CTF writeups, and insights from my experience in incident response and security operations.

reputation-checker.md8 min read
$date--format="%Y-%m-%d"Feb 21, 2024

Building a Reputation Checker to speed up the triag process

A practical guide to creat IP reputation automation workflow using n8n for SOC operations.

#n8n#Automation#SOC#SOAR#Tutorial#Threatintel
$catreputation-checker.md→
ip-reputation-check.md8 min read
$date--format="%Y-%m-%d"Jan 28, 2024

Building an IP Reputation Checker for any Security Environment

A practical guide to creat IP reputation automation workflow using n8n for SOC operations.

#n8n#Automation#SOC#SOAR#Tutorial
$catip-reputation-check.md→
n8n-security-workflows.md12 min read
$date--format="%Y-%m-%d"Jan 6, 2024

Building SOC Automation with n8n: Security Workflows That Work

A practical guide to creating security automation workflows using n8n for threat intelligence, incident response, and SOC operations.

#n8n#Automation#SOC#SOAR#Tutorial
$catn8n-security-workflows.md→
~/vraj/subscribe.shready
$echo"Stay updated"

Follow me on LinkedIn for the latest articles and security insights.

$follow --linkedin