Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis
☆176Jun 27, 2024Updated last year
Alternatives and similar repositories for Log-Analysis-Projects-for-Beginners
Users that are interested in Log-Analysis-Projects-for-Beginners are comparing it to the libraries listed below
Sorting:
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆137Jun 5, 2024Updated last year
- Hands-on projects for beginners to learn and practice essential cybersecurity skills through security assessments.☆123Jul 10, 2024Updated last year
- Hands-on cybersecurity training projects for beginners to learn vulnerability management and essential skills☆174Jun 20, 2024Updated last year
- Hands-on projects for beginners to learn and practice Active Directory monitoring using various tools.☆169Jun 21, 2024Updated last year
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆209Jun 29, 2024Updated last year
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆411Jun 17, 2024Updated last year
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- ☆15Feb 2, 2025Updated last year
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- ☆24May 29, 2025Updated 9 months ago
- ☆17Jun 21, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- This repository provides insight on how to get started with Microsoft Security☆11Nov 27, 2025Updated 3 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆129Feb 26, 2025Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 8 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆99Apr 3, 2024Updated last year
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 5 months ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 4 months ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Exercise files for Projectsecurity Enterprise 101 Module.☆42Jan 9, 2025Updated last year
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 5 months ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆25Mar 3, 2025Updated last year
- UNI-2021-2025☆10Aug 7, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆246Jun 3, 2024Updated last year
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆62Aug 6, 2025Updated 7 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆83Dec 3, 2025Updated 3 months ago
- ☆34May 24, 2023Updated 2 years ago
- ☆36Mar 28, 2025Updated 11 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆437Jun 3, 2024Updated last year
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆99Jan 25, 2026Updated last month
- ☆13Sep 28, 2024Updated last year