Popular repositories Loading
-
Securing-Cloud-Applications
Securing-Cloud-Applications PublicDeveloped and designed a cyber-blog web application using Azure’s Cloud services and Docker. Created and stored SSL certificates in Azure’s Key Vault, and bound them to secure the web application. …
-
Rekall-Penetration-Test-CTF
Rekall-Penetration-Test-CTF PublicIn this Capture The Flag (CTF) challenge, I conducted a penetration test on Rekall's Web Application, Linux servers and Windows Servers using my skills and knowledge acquired to uncover hidden flags
-
Building-a-Security-Monitoring-Environment
Building-a-Security-Monitoring-Environment PublicI designed a custom monitoring environment to protect a fictional organization, VSI using Splunk
-
TryHackMe-Redline
TryHackMe-Redline PublicLearning how to use REDLINE with THM. A tool I do not know of nor have not heard of.
-
TryHackme-KAPE
TryHackme-KAPE PublicAn introduction to Kroll Artifact Parser and Extractor (KAPE) for collecting and processing forensic artifacts
-
SOC-Automation-with-Active-Directory-Splunk-and-Shuffler
SOC-Automation-with-Active-Directory-Splunk-and-Shuffler PublicSet up a SOC automation to disable accounts when unauthorized login via RDP is detected.
If the problem persists, check the GitHub status page or contact support.