Skip to content
View 0x0allenace's full-sized avatar
💭
👤 Available for hire
💭
👤 Available for hire

Block or report 0x0allenace

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. security-anomaly-project security-anomaly-project Public

    Behavioral anomaly detection in synthetic enterprise security logs using unsupervised ML, adversarial attack simulation, and feature engineering

    Jupyter Notebook

  2. file-signature-detector file-signature-detector Public

    A lightweight Python-based file signature analyzer that detects true file types using magic bytes, designed for DFIR investigations, malware triage, and reverse engineering.

    Python 1

  3. ecorp-initial-dfir-lab ecorp-initial-dfir-lab Public

    A simulated enterprise DFIR lab environment modeling a corporate LAN with Active Directory, pfSense, Velociraptor, and attacker emulation for incident response and threat investigation.

    2

  4. Threat-Hunting-Recon Threat-Hunting-Recon Public

    Splunk-based threat hunting case study analyzing reconnaissance activity using the BOTS v2 dataset, focused on detecting anomalous user agents, pivoting to source IPs, and extracting actionable IOCs.

    2

  5. threat-hunting-initial-access threat-hunting-initial-access Public

    A hands-on Splunk threat hunting investigation focused on identifying initial access through spearphishing, user execution patterns, and IOC development.

    1

  6. velociraptor-incident-response-mimikatz velociraptor-incident-response-mimikatz Public

    A hands-on DFIR investigation using Velociraptor to contain a Mimikatz infection, collect forensic artifacts, and perform network-wide threat hunting.

    2