Thanks to visit codestin.com
Credit goes to Github.com

Skip to content
View 234vishal's full-sized avatar

Block or report 234vishal

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. awesome-machine-learning awesome-machine-learning Public

    Forked from 100/awesome-machine-learning

    A curated list of awesome Machine Learning frameworks, libraries and software.

    Python 1

  2. Network-Scan-Assessment Network-Scan-Assessment Public

    A GitHub repository template for documenting Port Analysis and MITRE ATT&CK Mapping based on identified open ports. This repo is structured for SOC/security teams to document reconnaissance finding…

    1

  3. Awareness-of-phishing-tactics Awareness-of-phishing-tactics Public

    This repository shows an example of a phishing email, explains why it is suspicious, and gives a short overview of phishing types.

    1

  4. Azure-Honeypot-Lab-With-Microsoft-Sentinel-SIEM- Azure-Honeypot-Lab-With-Microsoft-Sentinel-SIEM- Public

    A complete end-to-end security project where a Windows honeypot VM is deployed in Microsoft Azure and integrated with Microsoft Sentinel to detect failed login attacks, enrich logs using GeoIP data…

    1

  5. Vulnerability-Assessment-Report-Nessus Vulnerability-Assessment-Report-Nessus Public

    This repository contains a detailed vulnerability assessment report generated from a Nessus Essentials scan of a local host. The report analyzes the security posture of the host, documenting key fi…

  6. splunk-logs-and-investigations splunk-logs-and-investigations Public

    Forked from ethansilvas/splunk-logs-and-investigations

    Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly behavior derived from statistical baselines