Code from exercises and labs on TryHackMe. TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs on the browser!
-
Updated
Jan 30, 2022
Code from exercises and labs on TryHackMe. TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs on the browser!
Vulnerable dockerized environment designed to test OAuth vulnerabilities
Personal cybersecurity lab documenting hands-on exepriments, vulnerabilities analysis and exploitation in controlled environments(CTFs, DVWA, custom tools).
Master cybersecurity fundamentals through hands-on labs, covering threat analysis, risk management, network security, identity management, cryptography, and incident response. Perfect for CompTIA Security+ certification prep.
Hands-on cloud and Linux security labs focused on secure server configuration, IAM, and cloud fundamentals.
Penumbra Forge — security tools, local AI, developer utilities. One-person studio by Shadoe Myers.
SOC investigations, DFIR, threat detection , incident analysis and labs
Repository containing lab exercises and practical activities from the Master's Degree course in Computer Security at UNIMORE.
Write-ups and walkthroughs of vulnerable labs (THM, HTB, custom VMs)
Hands-on cybersecurity analysis projects focused on network security, reconnaissance, and threat analysis.
Comprehensive AWS Security Incident Response repository including notes, hands-on labs, incident response playbooks, workshops, case studies, and certificate of completion. Learn cloud security, threat detection, containment, and recovery in AWS environments.
A growing collection of structured TryHackMe walkthroughs as I train for SOC Analyst roles. Focused on enumeration, exploitation, and blue team techniques aligned with the SOC Level 1 path.
Hands-on cybersecurity lab projects including vulnerability assessment, network traffic analysis, and network discovery using Kali Linux.
The tests demonstrate all 9 common CORS misconfigurations actively: Wildcard origins Origin reflection with credentials Null origin trust Regex bypasses (prefix/suffix) Subdomain trust pivots Preflight caching issues Unsafe methods exposure Private Network Access misconfigs
A collection of real-world IDOR security labs highlighting broken access control and object-level authorization failures.
A Simple C program showing a buffer overflow vulnerability
Hands-on cybersecurity labs, CTF write-ups, and TryHackMe training notes documenting investigation methods, defensive security concepts, and analytical techniques.
A hands-on ethical hacking lab series focused on real-world offensive security techniques, including exploitation, privilege escalation, and attack simulation. This project documents my journey to becoming a cybersecurity professional through practical labs and detailed analysis.
Offensive security workspace focused on mobile, web, and red team labs.
Case studies, practical projects and security assessments with sensitive information preserved.
Add a description, image, and links to the security-labs topic page so that developers can more easily learn about it.
To associate your repository with the security-labs topic, visit your repo's landing page and select "manage topics."