<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Shreyas Hainalkar -</title>
    <description>The latest articles on DEV Community by Shreyas Hainalkar - (@shreyas_void).</description>
    <link>https://dev.to/shreyas_void</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3151643%2F7321cf6f-a518-4616-abf4-9f8e1a2abfc6.jpg</url>
      <title>DEV Community: Shreyas Hainalkar -</title>
      <link>https://dev.to/shreyas_void</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/shreyas_void"/>
    <language>en</language>
    <item>
      <title>5-Layer Windows Registry Anomaly Detection Using Python</title>
      <dc:creator>Shreyas Hainalkar -</dc:creator>
      <pubDate>Fri, 16 May 2025 09:42:57 +0000</pubDate>
      <link>https://dev.to/shreyas_void/5-layer-windows-registry-anomaly-detection-using-python-lfi</link>
      <guid>https://dev.to/shreyas_void/5-layer-windows-registry-anomaly-detection-using-python-lfi</guid>
      <description>&lt;p&gt;🧠 Project Overview&lt;/p&gt;

&lt;p&gt;I built a &lt;strong&gt;&lt;em&gt;Python-based Windows Registry anomaly detection tool&lt;/em&gt;&lt;/strong&gt; using a &lt;strong&gt;5-layer rule system&lt;/strong&gt; to detect unauthorized changes.&lt;/p&gt;

&lt;p&gt;Core Layers of Detection&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hash Verification – Detect any change by comparing stored vs current registry value hash&lt;/li&gt;
&lt;li&gt;Timestamp Monitoring – Identify unusual modification times&lt;/li&gt;
&lt;li&gt;User Activity Logging – Check which user made changes&lt;/li&gt;
&lt;li&gt;Behavioral Patterns – Track irregular or unexpected change patterns&lt;/li&gt;
&lt;li&gt;Access Frequency – Spot suspicious high-frequency access&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Tools Used&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Python&lt;/li&gt;
&lt;li&gt;Windows Registry Access (&lt;code&gt;winreg&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Event Logs (via Sysmon)&lt;/li&gt;
&lt;li&gt;Log Analysis Scripts&lt;/li&gt;
&lt;li&gt;Planned SIEM integration (e.g., Wazuh)&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Why I Built This
&lt;/h1&gt;

&lt;p&gt;I wanted to explore how intrusion detection could be implemented at the registry level without relying on full EDR tools, as a lightweight research-based security project.&lt;/p&gt;

&lt;p&gt;Future Plans&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Integrate with Wazuh for automated alerting&lt;/li&gt;
&lt;li&gt;Package as an open-source CLI utility&lt;/li&gt;
&lt;li&gt;Enhance with machine learning for anomaly classification&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I'd love to hear your thoughts and suggestions.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>career</category>
    </item>
    <item>
      <title>.</title>
      <dc:creator>Shreyas Hainalkar -</dc:creator>
      <pubDate>Wed, 14 May 2025 11:53:48 +0000</pubDate>
      <link>https://dev.to/shreyas_void/-a8l</link>
      <guid>https://dev.to/shreyas_void/-a8l</guid>
      <description></description>
    </item>
  </channel>
</rss>
