
Creating and Testing Snort Rules Part 1
A lab utilizing Snort to create and test custom intrusion detection rules.
A lab utilizing Snort to create and test custom intrusion detection rules.
Creating a test environment to practice cybersecurity tools and techniques.
Re-configuring the previous Python program to exploit a restricted SQL injection vulnerability
Creating a vulnerable web application and tool to practice SQL injection attacks
Working through making a Python program to bruteforce web login pages
Working through making a Python program to crack SHA-256 Passwords
A lab creating a simple SSH bruteforce tool and testing it against a target
Building, deploying, and testing a SIEM using Microsoft Sentinel
Writeup of the TryHackMe challenge U.A High School
Writeup of the TryHackMe room Mustacchio