🛠 Master reverse shells and backdoors in Kali Linux through a complete pentesting workflow, enhancing your security skills and understanding.
-
Updated
Mar 26, 2026 - Shell
🛠 Master reverse shells and backdoors in Kali Linux through a complete pentesting workflow, enhancing your security skills and understanding.
michalsoltysik.com | Cybersecurity Consultant | Forensics Examiner | SOC Trainer | Cyber Warfare Organizer | GCED | GCFE | GCFA | GNFA | HTB CDSA & CPTS | CRTS
Builds a simplified Command & Control (C2) prototype to study remote command execution and file transfer patterns, while exploring detection strategies from a defensive perspective.
Simulates a rogue Wi-Fi access point and a phishing login portal in an isolated lab to demonstrate credential-theft risks and to teach user awareness.
Demonstrates a full penetration workflow on a lab target: scanning, exploitation, reverse shell establishment, privilege escalation, and defensive validation.
Lifecycle-aware multi-agent cyber defense system for autonomous detection, mitigation, and recovery in software-defined networks.
20 hands-on enterprise security engineering labs spanning identity security, network defense, forensics, SIEM, incident response, and patch automation.
High-performance stateful network defense using eBPF/XDP. The Network Satellite for the Sentinel Runtime research system.
A novel adaptive security and deception platform using biological metaphors (protein folding, enzyme kinetics, immune response) with real cryptography, high-interaction honeypots, and Prometheus monitoring. Designed for biotech, pharma, and clinical research defense.
Comprehensive Cybersecurity Foundations repository including notes, labs, projects, workshops, case studies, and certificate of completion. Covers cybersecurity basics, network defense, access control, cryptography, risk management, incident response, and compliance.
Anotações e resumos da minha jornada de estudos na trilha de carreira Junior Cybersecurity Analyst, conectando desenvolvimento de software com segurança da informação.
A lightweight LAN anomaly detection tool for IT/Home network monitoring and blue team defense.
A visual demonstration of Ffini's technical understanding and growth in Cybersecurity; with a focus towards threat detection and analysis.
This project aims to create network emulator with gns3, then we build adaptive defense module on top
Capturing, analysing and responding to cyber attacks
Network Defense Essentials (NDE)
Cyber Security Certificatios
JackKnife is a Network Defense Tool Repository for Powershell. It is made up multiple powershell scripts I've made or borrowed to make work easier
A reproduced version of PyTorch from the official repository, based on TensorFlow/JAX.
Add a description, image, and links to the network-defense topic page so that developers can more easily learn about it.
To associate your repository with the network-defense topic, visit your repo's landing page and select "manage topics."