8000 SecOpsPete (Peter Van Rossum) Β· GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View SecOpsPete's full-sized avatar
πŸ›‘οΈ
Working on threat hunting labs and studying for N+
πŸ›‘οΈ
Working on threat hunting labs and studying for N+

Block or report SecOpsPete

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SecOpsPete/README.md

πŸ›‘οΈ Cybersecurity Projects & Technical Labs by Peter Van Rossum

πŸ“ Connect on LinkedIn


πŸš€ Cybersecurity Enthusiast | Analyst

I’m passionate about securing systems and solving real-world problems through hands-on projects. My portfolio highlights how I apply cybersecurity tools and frameworks to improve threat detection, vulnerability management, and operational resilience.


πŸ›‘οΈ DISA STIG Compliance Labs

  • πŸ“‹ Windows 10 STIG Remediation Scripts
    A growing collection of PowerShell scripts designed to automate remediation of DISA STIG findings on Windows systems. Each lab follows a standardized structure and includes clear metadata, usage instructions, and STIG traceability (e.g., WN10-AU-000500).
    Ideal for compliance hardening, audit preparation, or RMF/ATO alignment in federal and defense environments.

πŸ”Ž Threat Hunting Labs πŸ”—

  • πŸ•΅οΈβ€β™‚οΈ The Invisible RDP
    Investigates a suspicious RDP connection from a public IP that bypassed standard logging. Uncovers abuse of svchost.exe, persistent execution of wermgr.exe -upload, and stealthy HTTPS exfiltration activity using native Windows binaries.

  • πŸ•΅οΈβ€β™‚οΈ Unauthorized TOR Activity Detection
    Investigates unsanctioned installation and usage of the TOR browser using endpoint telemetry and network activity. Demonstrates detection of silent installation, anonymous traffic over TOR relay ports, and artifacts suggesting user concealment attempts.

  • πŸ›‘οΈ PwnCrypt Ransomware Detection
    Detects file encryption activity, delivery via PowerShell, and execution of the pwncrypt.ps1 ransomware script using Microsoft Defender telemetry and MITRE ATT&CK mapping.

  • πŸ§ͺ Suspicious Insider Exfiltration Attempt
    Investigates potential insider threat activity using Microsoft Defender for Endpoint, correlating file, process, and network telemetry to detect staged data exfiltration.

  • πŸ”Ž Threat Hunt: PowerShell Port Scanning
    Detection and investigation of internal lateral movement using obfuscated scripts.

  • 🌐 Threat Hunt: Exposed VM Brute Force
    Analysis of brute-force behavior on a cloud-based Linux server.


πŸ§ͺ Incident Response Labs πŸ”—

  • 🌍 Impossible Travel Detection with Microsoft Sentinel
    Detects anomalous sign-in behavior across distant geographic locations in short timeframes. Implements a Sentinel analytics rule and KQL-based investigation to identify potential account compromise. Follows the NIST IR framework for containment, validation, and closure.

  • ⚑ PowerShell Suspicious Web Request Detection
    Simulates post-exploitation behavior where PowerShell downloads remote payloads using Invoke-WebRequest. Includes Sentinel rule creation, incident triage, and MDE-based containment following the NIST IR framework.

  • πŸ” Brute Force Detection with Microsoft Sentinel
    Detects multiple failed login attempts from the same remote IP using KQL and Microsoft Sentinel analytics rules.

  • πŸ—ΊοΈ Sentinel Log Visualizations & Attack Maps
    Leverages Microsoft Sentinel to map failed logins, malicious flows, and Azure resource creation activity using KQL, custom watchlists, and Workbook-based heatmaps. Visualizes geolocated attack data across Entra ID, VM authentication, and NSG traffic using real telemetry.


⚠️ Vulnerability Management Projects πŸ”—


πŸ› οΈ Security Tools πŸ”—


🏠 Home Network Security πŸ”—

  • πŸ” Secure SOHO Network
    Documents the design and implementation of a secure small office/home office (SOHO) network. Features include IoT segmentation, guest SSID isolation, firewall configuration, endpoint protection with Malwarebytes, NordVPN, BitLocker encryption, and a Raspberry Pi syslog server for centralized logging.

  • 🧠 Kibana KQL Linux Threat Queries
    A curated set of Kibana Query Language (KQL) filters for detecting suspicious Linux activity including SSH brute force attempts, failed privilege escalation, reverse shell behavior, cron job tampering, and unexpected service starts. Designed for home labs or SOC environments leveraging syslog data and the ELK stack.

  • πŸ–¨οΈ Printer Firewall Hardening
    Secure a network printer by applying precise Windows Defender Firewall rules to block public exposure while preserving vendor updating & management functionality.

  • πŸ›‘οΈ Secure Network Security Profile
    Evaluates and documents the security posture of a SOHO network with layered defenses including VLAN segmentation, endpoint hardening, router firewall rules, BitLocker encryption, and syslog integration via Raspberry Pi. Includes visual diagrams and implementation walkthrough.

More tools coming soon: remediation automations, network analysis helpers, and more.


🀝 Connect With Me

LinkedIn

πŸ“« I’m always open to collaborate or discuss how to bring security into solution design.

Popular repositories Loading

  1. cybersecurity-tools cybersecurity-tools Public

    Practical tools and scripts for verifying software, checking file integrity, and improving system security.

    1

  2. SecOpsPete SecOpsPete Public

  3. email-assets email-assets Public

    Hosted images for professional email signature

  4. threat-hunting-scenarios threat-hunting-scenarios Public

    A collection of Microsoft Defender threat hunting labs

  5. vulnerability-management-projects vulnerability-management-projects Public

    Centralized repository for programmatic remediation scripts and documentation

    PowerShell

  6. incident-response-sentinel incident-response-sentinel Public

    Labs and tools focused on incident response using Microsoft Sentinel.

0