✅Portfolio: malcolmcybersec-io.pages.dev


<aside> 💡 Hi, welcome to my lab 👋 Please navigate to the “Hunting Projects” tab below for more!

</aside>


About 📚

Configured an isolated virtual environment to conduct Threat Hunting/ Incident Response tasks. This entails hunting for adversary TTPs, post-exploitation attacks against various endpoints, cloud systems, and analyzing raw netflow/log sources commonly seen in an enterprise environment.


TechStack

Wazuh(SIEM) → (Windows, Linux)

Wireshark

Snort(NIDS)

Powershell

Docker

Python

YARA


ENV 🏹

HuntingProjects

LAB SETUP