Phishing simulation — GoPhish lab guide
Step-by-step lab guide to run a safe phishing simulation using GoPhish and SET (Social-Engineer Toolkit). For isolated lab environments only.
Step-by-step lab guide to run a safe phishing simulation using GoPhish and SET (Social-Engineer Toolkit). For isolated lab environments only.
Step-by-step notes from a homelab penetration test: discovery, enumeration, Kerberos user discovery, brute force, and admin shell with Evil-WinRM. Includes commands used and outputs captured during the exercise.
Centralised logging and detection engineering in my Windows homelab using Splunk Enterprise and Universal Forwarders.
Overview of my Active Directory homelab: domain setup, users, security exercises, and next steps for monitoring and detection.