![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
🗓️ Jan 2025 Credential Security & Compliance |
🗓️ Dec 2024 Credential Azure Cloud Concepts |
🗓️ Dec 2024 Credential AI & Machine Learning |
🗓️ Dec 2024 Credential Core Data Concepts |
🗓️ Sep 2025 Credential Network Fundamentals |
🗓️ Dec 2024 Credential Ethical Hacking |
Popular repositories Loading
-
siem-project-splunk-snort-ossec
siem-project-splunk-snort-ossec PublicThis project sets up a security monitoring lab to analyze and respond to security incidents using tools like Splunk Enterprise, Snort, and TestmyNIDS. Leveraging NetinVM for virtualization, it crea…
-
business-network-topology
business-network-topology PublicA packet tracer project that represents a secure network topology design for a medium-small IT consulting business to ensure efficient operations, secure data management, and seamless communication.
-
server-multiclient-drones
server-multiclient-drones PublicSimulates a distributed system where drone clients send 3D coordinates to a server. The server manages client connections, assigns IDs, and forwards position updates within client groups for effici…
Java 1
-
wordle-game
wordle-game PublicA Java-based Wordle game using Model-View-Controller (MVC) architecture. Player 1 selects a word, and Player 2 guesses it within 8 attempts. Features include a ranking system, feedback indicators, …
Java 1
-
honeynet-vs-deception_technologies
honeynet-vs-deception_technologies PublicThis project aims to set-up a Honeynet, analyse the segreggated data by each honeypot, in order to seek a general attack pattern, describing the limitations and features provided in comparison to a…
-
wannacry-vs-lockbit
wannacry-vs-lockbit PublicThis repository is based on my Bachelor's Thesis for my Computer Engineering degree at the University of Valencia and contains all my findings, reports, and scripts of two ransomware families: Wann…
YARA 1
If the problem persists, check the GitHub status page or contact support.












