Skip to content
View kodefole-web's full-sized avatar

Block or report kodefole-web

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kodefole-web/README.md

My name is Kyle Efole & I’m an aspiring Cybersecurity professional looking to acquire an entry-level Security Analyst position. I have hands-on experience in incident response, memory forensics, malware analysis, threat hunting, and IDS rule engineering.


πŸ›‘οΈ Featured Incident Response Projects

Here are my four end-to-end IR case studies using real security tools and workflows:

πŸ”Ή Imperial Memory – Memory Forensics Memory forensics using Volatility to extract credentials, decrypt an encrypted archive, and identify hidden indicators from a memory dump.

πŸ”Ή Mail & Trail – Splunk Log Analysis & Threat Hunting Investigated malicious URL activity captured in a honeypot using Telnet, Splunk, SPL queries, VirusTotal, and Base64 decoding.

πŸ”Ή One of Us – Malware Triage & Backdoor Trojan Analysis Triaged 271 suspicious files using VirusTotal and ClamAV to identify a Trojan with a Meterpreter-style backdoor and extract its MD5 hash.

πŸ”Ή Pigs Rule – Network Traffic Analysis & Snort Rule Engineering Analyzed tcpdump packet captures, detected suspicious RDP traffic on port 3389, and wrote custom Snort IDS rules to generate alerts visualized in Snorby.


🧰 Tools & Technologies

πŸ”Ή SOC Tools

  • Splunk
  • Snort / Snorby
  • Volatility
  • Wireshark
  • tcpdump
  • ClamAV
  • VirusTotal
  • Base64 decoding tools

πŸ”Ή Systems & Platforms**

  • Linux (Ubuntu / Kali)
  • Windows Server (memory images)
  • Virtualization labs

πŸ”Ή Technical Skills**

  • Incident Response
  • Malware Triage
  • Memory Forensics
  • SIEM Analysis
  • Network Traffic Analysis
  • Writing Snort rules
  • Hashing (MD5/SHA)
  • Log Filtering / Threat Hunting
  • MITRE ATT&CK mapping

πŸ“œ Certification

  • CompTIA Security+ (SY0-701)

πŸš€ What I’m Working Toward

  • Breaking into a SOC Tier 1 Analyst role
  • Strengthening my detection skills
  • Improving cloud security fundamentals (AWS / Azure)
  • Continuing Blue Team projects and home labs

πŸ“« Connect With Me Email: kodefole@gmail.com
LinkedIn: www.linkedin.com/in/kyle-olivier-efole

Thanks for stopping by! Always open to opportunities, mentorship, and collaboration in cybersecurity.

Pinned Loading

  1. Incident-Response-Imperial-Memory- Incident-Response-Imperial-Memory- Public

    Memory Forensics investigation using Volatility to extract credentials,decrypt encrypted artifacts,and analyze RAM for hidden indicators

  2. Incident-Response-Mail-and-Trail- Incident-Response-Mail-and-Trail- Public

    Log analysis and threat hunting using Telnet, mailbox credential extraction, SPL queries, URL analysis, and VirusTotal verification

  3. Incident-Response-One-of-Us- Incident-Response-One-of-Us- Public

    Malware Triage of 271 files using ClamAV and VirusTotal to isolate a Trojan with a backdoor installed and extract the malicious MD5 signature

  4. Incident-Response-Pigs-Rule- Incident-Response-Pigs-Rule- Public

    Network Traffic Analysis with tcpdump and custom Snort IDS rule creation to detect suspicious RDP activity and visualize alerts in Snorby

    1