![More Metasploit….](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706462608741-N5RX4H665L9YIXLSIZ2N/2ENTk2K2_400x400.png)
More Metasploit….
![Assessing Security Culture within a Company](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706462938663-PYAZTLRFD5RQGA2HIQJY/image-asset.jpeg)
Assessing Security Culture within a Company
![Penetration Test Report](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463016800-BVE2WLQ8I6P1N0ZBZX9K/Screenshot+2024-01-28+122959.png)
Penetration Test Report
![Hacking a Vulnerable VM: Unmasking Vulnerabilities and Analyzing Incidents in Kibana](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706457524408-998VHQDZ8Q74JMOTY096/Screenshot+2024-01-28+105818.png)
Hacking a Vulnerable VM: Unmasking Vulnerabilities and Analyzing Incidents in Kibana
![Improving SOC Alerting and Real-time Threat Analysis by Own Exploits](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463242696-96OUBJXPLMR3Q69RJI3S/Screenshot+2024-01-27+143239.png)
Improving SOC Alerting and Real-time Threat Analysis by Own Exploits
![Network Forensics Analysis Report](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463304818-37LAG1DB8OW2T14HB51F/sflogo-front.png)
Network Forensics Analysis Report
![Protecting Data in Today’s Digital Landscape: Understanding Key Standards](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463336086-QP3IO4IN4OYSA50EIMQ6/image-asset.jpeg)
Protecting Data in Today’s Digital Landscape: Understanding Key Standards
![Guardians of the Digital Galaxy: The Role of Cyber Threat Intelligence](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463395259-XWV5L5T44OQTE04V4J5G/image-asset.jpeg)
Guardians of the Digital Galaxy: The Role of Cyber Threat Intelligence
![Exploring Linux Privilege Escalation](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463462668-AT5PXJQT9LYNTSE1PX1W/Screenshot+2024-01-28+123726.png)
Exploring Linux Privilege Escalation
![ILOVEYOU](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463507145-JDT400M3SPPL5T259NLN/Screenshot+2024-01-28+123809.png)
ILOVEYOU
![The Double-Edged Sword of AI in Cybersecurity: Challenges and Opportunities](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463544232-Z4X423J3PWTK3X4LS0T1/image-asset.jpeg)
The Double-Edged Sword of AI in Cybersecurity: Challenges and Opportunities
![Wicked6 MetaCTF Writeup](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463589461-X6593C9C12M8IQA6XJSR/Screenshot+2024-01-28+123934.png)
Wicked6 MetaCTF Writeup
![CySA+ Notes and Exam Tips](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463624049-A5XW4UQSJ3SYMTD4Q4CT/Comptia_CySA_2Bce.png)
CySA+ Notes and Exam Tips
![Investigating an Internal Policy Violation: Email](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463662144-6Q6ZPCOMFWVR4NPT40NP/image-asset.jpeg)
Investigating an Internal Policy Violation: Email
![In 2021, I Completed My First Ever CTF](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463701607-T86LLIOYRFFYTTHKBAU4/image-asset.jpeg)
In 2021, I Completed My First Ever CTF
![Exploit Vulnerable WordPress Installation, Set Alerts in Kibana](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463753578-JFBIU7015FEZGDBA36ZN/kibana-logo-color-v.png)
Exploit Vulnerable WordPress Installation, Set Alerts in Kibana
![Crack a WPA Key](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463784900-DM1LTZKWGZKRJZN55PIH/image-asset.jpeg)
Crack a WPA Key
![Computer Security Lab Report 1](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463807924-SPS0DF1QSB1DVMPG0K7S/image-asset.jpeg)
Computer Security Lab Report 1
![Risk Management Project](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463831268-W2YI7YR6ZAU7G5XJQ4H6/image-asset.jpeg)
Risk Management Project
![Computer Security Hacking Research Report](https://images.squarespace-cdn.com/content/v1/65b540fa119a1d28d99adbef/1706463858207-JCW65AKYQTR9V500NNDC/image-asset.jpeg)