Pentest Lab: Recon (Nmap) + DAST (OWASP ZAP baseline/full) against OWASP Juice Shop with reproducible HTML/TXT/PNG evidence and optional SOC correlation.
-
Updated
Nov 9, 2025 - HTML
Pentest Lab: Recon (Nmap) + DAST (OWASP ZAP baseline/full) against OWASP Juice Shop with reproducible HTML/TXT/PNG evidence and optional SOC correlation.
Personal SOC lab using T-Pot CE on AWS to analyze real-world attack telemetry through Honeypots, Suricata, and offline log analysis
Practical SOC detection engineering and incident response case studies, including SIEM/XDR detections, alert triage, and malware analysis.
Machine learning project for classifying cybersecurity incidents (TP, BP, FP) using the GUIDE dataset. Includes data preprocessing, feature engineering, model benchmarking, and evaluation with macro-F1, precision, and recall. Supports SOC automation, threat detection, and enterprise security management.
Wireless Zero Trust threat detection and response lab using Python and Scapy, with MITRE ATT&CK mapping and SIEM-style logging.
SOC-style ransomware investigation using KQL (Azure Data Explorer)
OT/ICS cybersecurity lab demonstrating detection of unauthorized Modbus RTU (FC06) write activity using Python telemetry and Splunk SIEM correlation. Includes MITRE ATT&CK (ICS) mapping and SOC-grade incident documentation.
Command-line (proctitle) classification into MITRE ATT&CK techniques using TF-IDF + Logistic Regression and an LSTM baseline, with a custom token pattern tailored for cyber artifacts (IPs, paths, flags, URLs).
Evidence-based SOC Tier 1/2 projects: log pipelines, alert triage, detection rules, threat hunting, incident tickets, and lab writeups (Wazuh, Sysmon, Zeek, Suricata, Velociraptor).
Enterprise Active Directory security lab focused on privileged access hardening, audit policy configuration, detection engineering, and incident response. Simulates unauthorized privilege escalation attacks with forensic log analysis and MITRE ATT&CK mapping.
SOC triage tool to enrich Windows command-line logs with MITRE mapping and analyst context
EDR/XDR detection coverage, gaps, and governance considerations for enterprise environments
Behavior-based Linux malware profiler: ptrace syscall tracing → JSONL events → heuristic analysis with IOC extraction & MITRE ATT&CK mapping. No signatures, no hashes
Add a description, image, and links to the mitre-attck topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attck topic, visit your repo's landing page and select "manage topics."