Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View Isaac-vo's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Isaac-vo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Zero-to-Lab-in-Cybersecurity Zero-to-Lab-in-Cybersecurity Public

    Learn how to set up a virtual lab in cybersecurity for performing attack simulations, incident response, threat intelligence and digital forensics.

    1

  2. Log-Analysis-Threat-Detection-Tool Log-Analysis-Threat-Detection-Tool Public

    The "Log Analysis & Threat Detection Tool" is a python based application created to parse windows logs and detect suspicious activities. This tool is enhanced with ML components (Isolation Forest a…

    Python

  3. Malware-Scanner Malware-Scanner Public

    The Malware-Scanner is an application designed to scan system files for malware and potential security risks. It helps quarantine or remove threats, ensuring the system remains secure.

    HTML

  4. Network-Scanner Network-Scanner Public

    The Network-Scanner App is a PyQt5-based GUI application that allows users to detect devices, scan ports, and assess vulnerabilities in their local network.

    Python

  5. Nmap-Scanning-Systems Nmap-Scanning-Systems Public

    Learn how to use Nmap to perform scans on systems to identify open ports, detect services and operating systems, list live hosts, run TCP SYN scans, and much more.

  6. Snort-Detecting-Cyberattacks Snort-Detecting-Cyberattacks Public

    In this project we'll be using Snort in one of the three VMs to detect cyberattacks within the network. We'll be exploring attacks such as: FTP brute force, HTTP exploit attempt, Netcat reverse she…