cyber security portfolio
LATEST ARTICLES
Data obfuscation In this tutorial, we’ll go through how to use regex to build data obfuscation in QRadar. For a variety of organisational reasons, there may be instances when...
a guide to bloodhound This is a short guide on how to execute a successful Bloodhound attack using Bloodhound.py script. I will be discussing initial setup with users in your lab environment...
If you’ve ever felt like the world is too big, too confusing or just downright overwhelming to tackle on your own, then this blog post is for you. I know what it feels like when it...
about me
Welcome to my personal portfolio, I have recently started my career in Cyber Security joining the largest provider for the telecommunications in the UK! I have decided to document some of the projects and different attack tools I will be working with and take you guys along with me.