Monitoring Brute Force Attacks
ProjectBuilt an Azure honeypot to capture brute-force login attempts. Investigated attacker activity with KQL and visualized source geolocations on a custom map.
Every hands-on lab, tool, and investigation — real infrastructure, real telemetry, real defense.
Built an Azure honeypot to capture brute-force login attempts. Investigated attacker activity with KQL and visualized source geolocations on a custom map.
Capture-the-flag threat hunt simulating a corporate compromise. Traced adversary activity via MDE telemetry and KQL to build a timeline across the attack lifecycle.
Investigated suspected TOR browser use to bypass company controls. Traced file activity, process execution, and network connections to known relay nodes.
A Python tool that scans .eml files for phishing indicators. Checks sender, body, links, and attachments — assigns a score, verdict, and optional VirusTotal checks.
Scanned an Azure environment with Nessus to uncover vulnerabilities across VMs and services. Prioritized high-severity risks and validated fixes through follow-up scans.
Python workflow connecting the OpenAI API to an Azure environment for log aggregation. AI-driven triage accelerates detection and reduces manual SOC workload.