Pentest Lab: Recon (Nmap) + DAST (OWASP ZAP baseline/full) against OWASP Juice Shop with reproducible HTML/TXT/PNG evidence and optional SOC correlation.
-
Updated
Nov 9, 2025 - HTML
Pentest Lab: Recon (Nmap) + DAST (OWASP ZAP baseline/full) against OWASP Juice Shop with reproducible HTML/TXT/PNG evidence and optional SOC correlation.
Personal SOC lab using T-Pot CE on AWS to analyze real-world attack telemetry through Honeypots, Suricata, and offline log analysis
Practical SOC detection engineering and incident response case studies, including SIEM/XDR detections, alert triage, and malware analysis.
Machine learning project for classifying cybersecurity incidents (TP, BP, FP) using the GUIDE dataset. Includes data preprocessing, feature engineering, model benchmarking, and evaluation with macro-F1, precision, and recall. Supports SOC automation, threat detection, and enterprise security management.
SOC-style ransomware investigation using KQL (Azure Data Explorer)
Incident Response investigation of a multi-stage attack detected in Microsoft Defender for Endpoint telemetery
SOC Alert Triage Lab – Simulated SOC alert classification and triage using Python.
OT/ICS cybersecurity lab demonstrating detection of unauthorized Modbus RTU (FC06) write activity using Python telemetry and Splunk SIEM correlation. Includes MITRE ATT&CK (ICS) mapping and SOC-grade incident documentation.
Wireless Zero Trust threat detection and response lab using Python and Scapy, with MITRE ATT&CK mapping and SIEM-style logging.
Command-line (proctitle) classification into MITRE ATT&CK techniques using TF-IDF + Logistic Regression and an LSTM baseline, with a custom token pattern tailored for cyber artifacts (IPs, paths, flags, URLs).
Real-time SOC monitoring dashboard with brute-force detection, threat intelligence enrichment, MITRE ATT&CK mapping and incident response workflow.
Evidence-based SOC Tier 1/2 projects: log pipelines, alert triage, detection rules, threat hunting, incident tickets, and lab writeups (Wazuh, Sysmon, Zeek, Suricata, Velociraptor).
Enterprise Active Directory security lab focused on privileged access hardening, audit policy configuration, detection engineering, and incident response. Simulates unauthorized privilege escalation attacks with forensic log analysis and MITRE ATT&CK mapping.
Portable SIEM detection toolkit with Sigma rules, Sysmon config, and Wazuh custom rules mapped to MITRE ATT&CK.
SOC triage tool to enrich Windows command-line logs with MITRE mapping and analyst context
EDR/XDR detection coverage, gaps, and governance considerations for enterprise environments
Behavior-based Linux malware profiler: ptrace syscall tracing → JSONL events → heuristic analysis with IOC extraction & MITRE ATT&CK mapping. No signatures, no hashes
Add a description, image, and links to the mitre-attck topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attck topic, visit your repo's landing page and select "manage topics."