A practical penetration testing walkthrough focused on enumeration, exploitation, and privilege escalation.
This project is based on the Silver Platter room on TryHackMe, guided by Tyler Rambsey from Simply Cyber. It involves attacking a vulnerable machine using Kali Linux to perform real-world offensive security tasks including service enumeration, vulnerability exploitation, and privilege escalation.
The walkthrough is structured in three phases: Setup & Enumeration, Exploitation, and Privilege Escalation. Tools like Nmap, Rustscan, Burp Suite, Hydra, and LinPEAS are used to simulate a complete attack chain from reconnaissance to root access.
An analysis of phishing techniques and countermeasures, including email security, user awareness training, and detection methods.
This project explores the evolving landscape of phishing attacks and provides a comprehensive framework for organizations to defend against these threats. It includes analysis of real-world phishing campaigns, technical implementation of email security protocols, and development of effective user training programs.
An incident response framework for detecting, investigating, and mitigating token theft attacks, ensuring rapid containment and recovery.
This project provides a comprehensive approach to handling token theft incidents by combining alert triage, investigation techniques, containment strategies, and post-incident monitoring. It aims to strengthen organizational defenses against unauthorized token use and improve response efficiency.
A collection of KQL queries focused on threat detection, investigation, and monitoring across Microsoft security tools.
This project serves as a practical resource for building detection capabilities using Kusto Query Language (KQL) in Microsoft Sentinel, Defender, and Entra. It includes real-world use cases to help security teams proactively detect malicious activity.
This project highlights my work from the Introduction to AWS Pentesting course by Simply Cyber Academy. The course focuses on identifying and exploiting common security misconfigurations within AWS cloud environments through practical, hands-on exercises.
For this portfolio entry, I have documented two capstone challenges from the course where I applied the concepts learned to identify security weaknesses in AWS environments. The detailed walkthroughs of these capstone challenges are available in my GitHub repository through the link provided.
This project highlights my work from a Windows Investigation lab on TryHackMe, focused on analyzing a compromised endpoint and identifying malicious activity through hands-on investigation.
In this investigation, I analyzed system artifacts, registry entries, and process activity to uncover persistence mechanisms and decode a malicious PowerShell payload. A detailed walkthrough of the investigation is available in my GitHub repository.