- New York, NY
- in/juan-agramonte-99a8b0399
Pinned Loading
-
endpoint-telemetry-pipeline
endpoint-telemetry-pipeline PublicBuilding a reliable Windows endpoint telemetry pipeline using Sysmon and Splunk before detection engineering.
-
kali-to-splunk-authentication-detection
kali-to-splunk-authentication-detection PublicSimulated RDP brute force from Kali to Windows with Splunk detection, MITRE ATT&CK mapping (T1110), alerting, and defensive hardening.
-
sysmon-eid1-detection-engineering
sysmon-eid1-detection-engineering PublicDetection engineering with Sysmon EID 1 in Splunk, including process baselining, LOLBin detections, and alert tuning.
-
windows-authentication-abuse-detection
windows-authentication-abuse-detection PublicDetection engineering lab focused on identifying Windows authentication abuse (brute force, password spray, and account lockouts) using native Security logs ingested into Splunk. Includes validated…
-
pfsense-to-splunk-rdp-segmentation-detection
pfsense-to-splunk-rdp-segmentation-detection PublicPhase 2 — Network segmentation validation and RDP brute force telemetry correlation using pfSense, Windows Security logs (4625), and Splunk SIEM.
If the problem persists, check the GitHub status page or contact support.