-
Shell-Script-Devops-Projects Public
This is a Bash script designed to fetch a list of GitHub users with read access to a specific repository.
-
Jenkins-Kubernetes-Projects Public
This is collection of Jenkins-Kubernetes projects.
Python MIT License UpdatedMar 23, 2025 -
Terraform-Projects Public
Welcome to the terraform-projects repository! This repository is a collection of various Terraform projects designed to automate the provisioning and management of infrastructure across different c…
-
Ansible-Projects Public
This repository contains various Ansible playbooks, roles, and collections I've worked on, demonstrating automation, configuration management, and orchestration tasks using Ansible.
-
Reverse-Proxy-Server-setup Public
In this project, I have setup 2 apache web servers that are integrated with nginx reverse proxy server. Restrict user to see original IP and to prevent from external attacks.
UpdatedFeb 16, 2025 -
This project is an extension of our previous AWS Serverless API application. It focuses on authorizing API requests, implementing rate limiting, and creating API keys to secure your database from u…
Python UpdatedFeb 15, 2025 -
This project demonstrates a serverless application architecture using AWS services. The architecture includes an API Gateway, AWS Lambda functions, and DynamoDB for data storage. The application al…
-
serverless-EC2-manager Public
This project is targeting real-world problem-scenario : Serverless EC2 Instance Scheduler for Company Working Hours. We used services like lambda function, cloudwatch, EC2 instance to create soluti…
Python UpdatedJan 31, 2025 -
This project is created to monitor and record s3 buckets performance, cost and security.
UpdatedJan 3, 2025 -
This project is focussed on practical problem of Resource management on cloud. where i try to give solution on Efficient AWS Cost Management through Stale Resource Detection
Python UpdatedJan 2, 2025 -
The Project Show us, How we can leverage Powershell script automation to collect artifacts and create work efficient. The motive of this Project is to reduce manual efforts and increase productivity.
-
Portfolio Public
Passionate and skilled🎯 in cybersecurity⚔️ and web development, I am having hands on experience with many vulnerabilties🐞, crafting secure, responsive web applications. Having owasp 10 , Sans CWE k…
CSS UpdatedNov 12, 2024 -
PhishGaurd Public
PhishGuard: AI-Powered Email Phishing Analysis🔎. PhishGuard leverages AI and ML technologies to detect ⚓🐟phishing attacks. With real-time detection, comprehensive reports, and an userfriendly inter…
-
The Lab shows how to create and configure Gorman_Virustotal app that allow us to configure with Virustotal-api-key, So we can reduce efforts of searching each Suspicious Event manually by visiting …
Python UpdatedNov 8, 2024 -
Splunk-SOAR-Phantom-Lab Public
In this Lab I will try to cover how can we install Splunk SOAR, and how we can configure it to play automation of threat response.
UpdatedNov 7, 2024 -
In this project, we will upload sample FTP log files to Splunk SIEM and perform various analyses to gain insights into FTP activity within the network.
UpdatedNov 7, 2024 -
DNS-log-analysis-with-SIEM Public
In this project, I have discussed about DNS log analysis on splunk SIEM tool with help of SPL queries by using searching & reporting feature.
UpdatedNov 7, 2024 -
SSH-log-analysis-with-SIEM Public
The Project shows how we can upload sample SSH log files to Splunk SIEM and perform various analyses to gain insights into SSH activity within the network.
UpdatedNov 7, 2024 -
In this project, we will upload sample DHCP log files to Splunk SIEM and perform various analyses to gain insights into IP address assignment within the network.
UpdatedNov 7, 2024 -
The Project shows how we can upload sample DHCP log files to Splunk SIEM and perform various analyses to gain insights into IP address assignment within the network.
UpdatedNov 7, 2024 -
FTP-log-analysis-with-splunk Public
The Project shows how we can upload sample FTP log files to Splunk SIEM and perform various analyses to gain insights into FTP activity within the network.
UpdatedNov 7, 2024 -
YARA-Lab-Setup Public
This lab is design to installation and configuration of YARA in linux machine. also we will see how we can create rules for malware or threat detection with realworld examples.
UpdatedNov 7, 2024 -
This Lab is going to cover practical scenario of incident response in corporate environment. Here I will try to show how the Malware eradication process works. That is one of the main process of in…
UpdatedNov 6, 2024 -
In this lab, I've created exercises to help beginners clear the basics of network traffic analysis using Wireshark on a Linux system. Gain hands-on experience in filtering and examining packets, id…
UpdatedNov 6, 2024 -
Splunk-SIEM-Lab Public
Splunk is a powerful platform for searching, monitoring, and analyzing machine-generated big logs data in real-time. The Splunk Indexer processes incoming data, transforming it into searchable even…
UpdatedOct 29, 2024 -
Snort-IDS-Home-Lab Public
In this Home-lab, i will show you how to install Snort in local machine. Snort is an Intrusion Detection System(IDS) and an Intrusion Prevention System (IPS). it is used to notify and alert the sec…
UpdatedOct 29, 2024 -
Suricata-IDS-Lab Public
The goal of setting up a Suricata home-lab is to gain practical experience in deploying and configuring an Intrusion Detection System (IDS) for network security monitoring. Suricata is an open-sour…
UpdatedOct 29, 2024 -
NetProbe Public
NetProbe is a high-performance port scanning CLI tool designed to quickly identify open ports on target systems. By leveraging the power of threading, NetProbe ensures fast and efficient scanning, …
Python Other UpdatedOct 28, 2024 -
EDR-PowerShield Public
EDR is powerful tool combines IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) capabilities into a single, efficient package. Leveraging PowerShell scripts, it continuously mo…
PowerShell UpdatedOct 28, 2024 -
Redirect-Tracker Public
Designed to identify 🔎 open redirect vulnerabilities🪲 which can be chained 🔗⚓ with other vulnerabilities. this tool leverages asynchronous operations that reduce scan time by 80%, significantly enh…