Skip to content
View zeroday-studio's full-sized avatar

Block or report zeroday-studio

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. wazuh-soc-lab wazuh-soc-lab Public

    SOC Lab using Wazuh (Brute Force + FIM Detection)

  2. pfsense-suricata-home-lab pfsense-suricata-home-lab Public

    Designed and implemented a SOC home lab using pfSense and Suricata IDS/IPS to detect, analyze, and prevent real-world cyber attacks including scanning, exploitation, and brute-force attacks

  3. CEH-V13-notes CEH-V13-notes Public

    1

  4. metasploit-vapt-lab metasploit-vapt-lab Public

    End-to-end VAPT project using Metasploit on Metasploitable2, covering reconnaissance, enumeration, exploitation, post-exploitation, and mitigation.

  5. DVWA-VAPT-Lab DVWA-VAPT-Lab Public

    DVWA-based Web VAPT lab demonstrating OWASP Top 10 vulnerabilities with practical exploitation and mitigation.

  6. Active-Directory-Attack-Detection-Lab Active-Directory-Attack-Detection-Lab Public

    Simulated an enterprise Active Directory environment to perform RDP brute-force attacks and MITRE ATT&CK-based threat emulation using Atomic Red Team, with detection and log analysis in Splunk SIEM.