Skip to content
View calghar's full-sized avatar

Organizations

@dynatrace-oss

Block or report calghar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
calghar/README.md
Header - Farooq Shaikh, Security Researcher

Typing SVG


LinkedIn Google Scholar Blog Dynatrace OSS


About Me

Security Researcher at Dynatrace specializing in cloud native security and runtime threat detection.

  • Focus Areas: Vulnerability Analysis, Kubernetes Security, Runtime Detection, AI/ML for Threat Detection
  • Research: Identity Attacks, IoT Security, Container Security, Exploitation Frameworks
  • Current Work: Building open source security tools, cloud threat detection systems, vulnerability testing frameworks
  • Contributing: Cilium Tetragon ecosystem, cloud security projects

Featured Projects

crypto-jack-agent

Detect CryptoJacking attacks using runtime analysis and behavioral detection techniques.

Python Security Runtime Detection

tetragon-mcp

MCP server implementation for Tetragon, enabling AI-powered security observability workflows.

Go Tetragon MCP

k8s-exploit-toolkit · Dynatrace OSS

Comprehensive security testing framework for Kubernetes environments, designed for educational and defensive security testing.

Python Kubernetes Security Testing

gh-account-switcher

Tool for quickly switching between multiple GitHub accounts from the command line.

Shell GitHub CLI Developer Tools


Latest Blog Posts

Container misconfigurations -- From theory to exploitation

Practical exploration of container vulnerabilities and exploitation techniques

October 2025

Kubernetes misconfiguration attack paths

Attack vectors stemming from K8s misconfigurations and defensive approaches

April 2025

Understanding Kubernetes security misconfigurations

Foundation of Kubernetes configuration security issues

April 2025

Apache Struts CVE-2024-53677 Analysis

Vulnerability analysis and detection indicators

February 2025

View All Posts


Publications & Patents

Key Publications Patent Portfolio
Machine Learning Model for Classifying Unsolicited IoT Devices
14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018
System and Method for Cybersecurity Reconnaissance, Analysis, and Score Generation
US Patent 11,297,109 · 11,924,251 · 12,335,317
Internet of Malicious Things: Correlating Active and Passive Measurements
IEEE Communications Magazine, Vol. 56(9), pp. 170-177, 2018
Detecting and Mitigating Golden SAML Attacks Against Federated Services
US Patent 11,552,968 · 11,818,150
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution
IEEE/IFIP Network Operations and Management Symposium (NOMS), 2023
Cybersecurity Analysis and Protection Using Distributed Systems
US Patent 11,968,235 · 12,267,369

Google Scholar


Technology Stack

Go Python C Bash eBPF

Kubernetes Docker Cilium Linux

TensorFlow PyTorch Tetragon AWS GCP


GitHub Activity

GitHub Streak


Open to collaborations on security research and cloud native security projects

Footer

Popular repositories Loading

  1. gh-account-switcher gh-account-switcher Public

    Tool for quickly switching between multiple GitHub accounts

    Go 3 1

  2. tetragon-mcp tetragon-mcp Public

    MCP server implementation for Tetragon

    Go 1

  3. crypto-jack-agent crypto-jack-agent Public archive

    Detect CryptoJacking attacks

    Python

  4. tetragon tetragon Public

    Forked from cilium/tetragon

    eBPF-based Security Observability and Runtime Enforcement

    C

  5. koney koney Public

    Forked from dynatrace-oss/koney

    Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and…

    Go

  6. dotfiles dotfiles Public

    Personal configuration setup

    Shell