🌐Repo:https://github.com/MalcolmTKS/TH-Proj ✅Portfolio: malcolmcybersec-io.pages.dev
🔬Malware Analysis Lab: https://stellar-aura-301.notion.site/Malware-Analysis-0x0-9501eccc221b479383bb52898e7505f1
<aside> 💡 Hi, welcome to my lab 👋 Please navigate to the “Hunting Projects” tab below for more!
</aside>
I configured an isolated virtual environment to conduct Threat Hunting/ Incident Response tasks and to implement the TH workflow. This entails hunting for adversary TTPs, post-exploitation attacks against various endpoints, cloud systems, and analyzing raw netflow/log sources commonly seen in an enterprise environment.
Wazuh(SIEM) → (Windows, Linux)
Wireshark
Snort(NIDS)
Powershell
Docker
Python
Suricata
YARA