✅Portfolio: malcolmcybersec-io.pages.dev
<aside> 💡 Hi, welcome to my lab 👋 Please navigate to the “Hunting Projects” tab below for more!
</aside>
Configured an isolated virtual environment to conduct Threat Hunting/ Incident Response tasks. This entails hunting for adversary TTPs, post-exploitation attacks against various endpoints, cloud systems, and analyzing raw netflow/log sources commonly seen in an enterprise environment.
Wazuh(SIEM) → (Windows, Linux)
Wireshark
Snort(NIDS)
Powershell
Docker
Python
YARA