By Faraz Ahmed
Hands-On Security Engineering & System Administration
This repository showcases my practical, hands-on experience in system security, network administration, and cybersecurity operations. Each lab demonstrates real-world skills in configuring, securing, and analyzing computer systems and networks.
Through these labs, I have developed and demonstrated proficiency in:
- Cross-platform OS deployment (Windows & Linux)
- Virtualization management (VMware vSphere)
- System hardening and security configuration
- User and permission management
- Network configuration and troubleshooting
- TCP/IP protocol analysis
- Routing and switching concepts
- DNS and connectivity diagnostics
- Security baseline implementation
- Vulnerability assessment
- Incident response procedures
- Security monitoring and logging
- Command-line proficiency (PowerShell, Bash)
- Network diagnostic utilities
- Virtualization platforms
- Security assessment tools
| Lab # | Title | Key Skills | Difficulty |
|---|---|---|---|
| [01] | OS Installation & Network Connectivity | Virtualization, Network Diagnostics, Cross-Platform Admin | β Beginner |
| [02] | pfSense Router & Network Segmentation | Firewall Configuration, IDS Deployment, Network Architecture | ββ Intermediate |
| [03] | Firewall Rules & Access Control | Protocol-Specific Rules, Least Privilege, Security Testing | βββ Intermediate/Advanced |
| [04] | Active Directory & Group Policy | AD DS, User Management, GPO, IIS, PowerShell Logging | ββββ Advanced |
| [05] | Linux Server Hardening & Automation | LAMP Stack, Security Hardening, Bash Scripting, Cron Jobs | ββββ Advanced |
| [06] | Windows Threat Hunting & Incident Response | Malware Analysis, IFEO Forensics, Event Log Analysis, IR Documentation | βββββ Expert |
| [07] | Service Deployment, MediaWiki & Fail2Ban | MariaDB Admin, MediaWiki, iptables, Fail2Ban, Multi-Tier Architecture | βββββ Expert |
| [08] | Network Architecture & Security Proposals | Network Documentation, Honeypots, IDPS, Business Case Writing, ROI Analysis | βββββ Expert |
| [09] | Containerization & SIEM (Graylog) | Docker, Docker Compose, Graylog, rsyslog, Alert Engineering, SOC Dashboards | βββββ Expert |
| [10] | Risk Analysis & Management | PII/SPII Assessment, SIEM Evaluation, Cost-Benefit Analysis, Executive Memos | βββββ Expert |
| [11] | Penetration Testing & Ethical Hacking | Nmap, SQL Injection, Reverse Shells, Privilege Escalation, Pentest Reporting | βββββ Expert |
Note: This repository is actively being updated as I complete additional labs. Check back for new content!
Status: β Complete | View Full Documentation β
Deployed Windows 10 Enterprise and Ubuntu Linux in a virtualized environment, configured network settings, and validated connectivity using platform-specific CLI tools.
- β Successfully installed two enterprise operating systems
- β Configured virtual networking infrastructure
- β Performed cross-platform network diagnostics
- β Created network topology documentation
VMware vSphere Windows 10 Enterprise Ubuntu Linux PowerShell Bash TCP/IP DNS
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Deployed pfSense firewall/router to create segmented enterprise network architecture with AdminNet and ServerNet zones. Configured static routing between segments and implemented Suricata IDS for network monitoring.
- β Installed and configured pfSense CE 2.7.2 router
- β Created multi-segment network architecture (AdminNet, ServerNet)
- β Configured advanced Windows PowerShell and Linux netplan networking
- β Deployed Suricata IDS on external interface
- β Validated inter-VLAN routing and internet connectivity
- β Implemented security best practices (network segmentation, monitoring)
pfSense Suricata IDS Network Segmentation PowerShell netplan Inter-VLAN Routing IDS/IPS Enterprise Networking
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Implemented granular firewall rules on pfSense to control inbound and outbound traffic, restricted administrative access to a single designated workstation, and systematically validated rule effectiveness through comprehensive testing.
- β Created protocol-specific inbound rules (WinRM, RDP, SSH)
- β Configured outbound rules for business functions (FTP, HTTP/HTTPS, DNS, Windows Update)
- β Implemented least-privilege administrative access (only one device manages firewall)
- β Disabled overly-permissive anti-lockout rule
- β Conducted 17 validation tests with 100% success rate
- β Authored professional security policy memo for executive approval
- β Demonstrated defense-in-depth and zero-trust principles
pfSense Firewall Rules WinRM RDP SSH Access Control Lists Protocol Filtering Security Testing Policy Documentation Least Privilege
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Deployed enterprise Active Directory infrastructure with domain services, created centralized user and group management, implemented Group Policy Objects for configuration control, installed IIS web server, and established PowerShell logging for security monitoring.
- β Deployed Active Directory domain (team32.local) with domain controller
- β Joined Win10Client and IISServer to domain for centralized management
- β Created users with role-based permissions (Kevin - Domain Admin, Dave CEO - Standard User)
- β Implemented security groups (UBFaculty, Workstations) for access control
- β Deployed IIS web server on IISServer with remote management
- β Created Desktop Background GPO with network share distribution
- β Implemented PowerShell Transcription GPO for security auditing
- β Designed Organizational Unit structure for granular policy application
- β Authored executive memo proposing password policy enhancements
- β Demonstrated Single Sign-On (SSO) and centralized authentication
Active Directory Group Policy Objects (GPO) IIS Web Server PowerShell Logging Domain Services RBAC Server Manager Organizational Units Network Shares Security Auditing
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Deployed enterprise Linux infrastructure with Ubuntu web server (Apache2 + PHP) and Rocky Linux database server (MariaDB), implemented comprehensive security hardening including password policies and file permissions, created user/group management with RBAC, and automated log backup with bash scripting and cron scheduling.
- β Deployed LAMP stack (Linux, Apache, MySQL/MariaDB, PHP) across two servers
- β Configured cross-distribution Linux (Ubuntu + Rocky Linux)
- β Implemented 6 security hardening controls (CIS Benchmark alignment)
- β Enforced password complexity (10 chars, 2 digits, 1 uppercase)
- β Created 5 users and 3 security groups with role-based access
- β Configured sudo privileges with visudo for BlackTeam group
- β Applied file permission restrictions (chmod 700, 750)
- β Enabled automatic security updates (unattended-upgrades)
- β Wrote bash script for automated log backup with tar compression
- β Scheduled daily cron job (4:05 AM) for log management
- β Added 7 pfSense firewall rules for server access control
Ubuntu Server Rocky Linux Apache2 PHP MariaDB Bash Scripting Cron PAM sudo/visudo libpam-pwquality SELinux unattended-upgrades systemd tar Log Management
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Conducted real-world incident response investigation by analyzing a security breach involving brute force authentication, identified and removed IFEO (Image File Execution Options) registry hijacking malware, eliminated unauthorized user account and persistence mechanisms, and documented findings in a professional incident report with executive summary and security recommendations.
- β Investigated active security incident using Windows Event Viewer
- β Identified attack timeline through Event ID analysis (4624, 4625, 4720, 4732)
- β Discovered IFEO registry hijacking (Task Manager β Notepad redirect)
- β Analyzed brute force authentication attack vector and successful breach
- β Removed unauthorized backdoor account ("notbad") created via PowerShell
- β Eradicated malware persistence mechanisms (registry keys, files, processes)
- β Performed system integrity verification with System File Checker (sfc /scannow)
- β Documented complete incident report with IoCs and remediation steps
- β Provided executive summary with business impact assessment
- β Created security recommendations (MFA, password policy, EDR, SIEM)
- β Performed Linux network forensics with socket statistics (ss -tlp)
Windows Event Viewer Registry Editor (regedit) IFEO Analysis PowerShell Forensics System File Checker Task Manager Malware Analysis Incident Response Event Log Analysis IoC Identification Network Forensics (ss) Threat Hunting
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Deployed a full multi-tier web application by configuring MariaDB with a dedicated database and least-privilege user on RockyDBServer, installed and integrated MediaWiki on UbuntuWebServer, implemented host-based iptables firewall rules with default-deny policy, validated access control across all network segments with systematic testing, and hardened SSH with Fail2Ban following a real brute force attack detection.
- β Created dedicated MariaDB database (wiki_webdb) and non-root user with granular privileges
- β Deployed MediaWiki end-to-end: installation wizard, database integration, admin configuration
- β Connected web application to remote database across network segments (port 3306)
- β Implemented 7 iptables rules on UbuntuWebServer with default-deny policy
- β Layered host-based firewall (iptables) on top of network firewall (pfSense) β defense-in-depth
- β Ran 7 systematic access validation tests (4 allowed paths, 3 denied paths confirmed)
- β Deployed Fail2Ban in response to real SSH brute force attack (detected Oct 15, 2024)
- β Configured Fail2Ban: 5-attempt threshold, 1-hour ban, SSH jail monitoring
- β Authored executive security remediation memo to CEO with business impact analysis
MariaDB MediaWiki iptables Fail2Ban Apache2/PHP curl SSH Multi-Tier Architecture Default-Deny Policy Least Privilege Defense-in-Depth
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Created comprehensive network documentation including detailed hardware/software inventory across multiple network segments (AdminNet, ServerNet, OfficeNet, WebNet, GuestNet), designed enterprise multi-tier network topology with proper IP addressing and subnet architecture, and developed two executive-level security proposals with complete cost-benefit analysis for implementing honeypots/honeynets ($20K) and IDPS systems ($30K) including ROI justification and real-world incident case studies.
- β Documented complete network inventory: 9 devices with MAC, IP, gateway, DNS, OS, services
- β Created network topology with 5 segments and proper CIDR notation
- β Designed multi-tier architecture: OfficeNet (10.2.0.0/28), WebNet (10.3.0.0/28), GuestNet (10.4.0.0/28)
- β Authored Proposal 1: Honeypots & Honeynets implementation ($20K investment)
- β Authored Proposal 2: IDPS deployment ($30K investment)
- β Researched industry data: 40% intrusion reduction, 60-70% faster breach detection
- β Cited real-world incidents: Target breach (2013), Equifax breach (2017)
- β Developed ROI analysis: $50K investment vs $4.45M breach cost prevention
- β Created 3-year TCO analysis with maintenance costs
- β Professional executive memo to CEO with business impact justification
Network Documentation IPAM Honeypots Honeynets IDS/IPS IDPS Deception Technology Threat Intelligence Network Topology Design Business Case Development ROI Analysis Cost-Benefit Analysis
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Deployed enterprise SIEM infrastructure using Docker containerization with Graylog stack (Graylog + MongoDB + Elasticsearch), configured centralized log aggregation via rsyslog from Linux servers and pfSense network devices, engineered 4 custom security alerts for critical events (failed SSH, failed logins, firewall changes, privilege escalation), and built real-time SOC operational dashboard with automated monitoring capabilities.
- β Deployed multi-container Graylog SIEM using Docker Compose (Infrastructure as Code)
- β Configured Graylog stack: Graylog + MongoDB (metadata) + Elasticsearch (log storage)
- β Implemented rsyslog forwarders on Linux (UbuntuWebServer) sending to UDP port 5140
- β Configured pfSense remote logging to centralized SIEM
- β Created 4 custom security alerts with search queries and thresholds
- β Alert 1: Failed SSH for non-existent user (brute force detection)
- β Alert 2: Failed login to pfSense WebConfigurator (admin compromise attempt)
- β Alert 3: Firewall rules changed (unauthorized configuration)
- β Alert 4: User added to sudo group (privilege escalation)
- β Built SOC dashboard with Events Overview, charts, and real-time widgets
- β Implemented firewall rules: HTTP access + syslog forwarding + default deny
- β Demonstrated log search, filtering, and forensic analysis capabilities
Docker Docker Compose Graylog SIEM MongoDB Elasticsearch rsyslog Syslog Protocol YAML Alert Engineering SOC Operations Log Aggregation Security Event Detection Dashboard Development Containerization
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Conducted comprehensive risk assessment of MediaWiki PII/SPII vulnerabilities by analyzing frontend user registration and backend database storage, identified critical security risks (password hashes, plaintext emails), evaluated SIEM solutions (SolarWinds vs. Wazuh) with complete 5-year TCO analysis ($513K vs. $10.5K), performed cost-benefit evaluation demonstrating $502K savings (98% reduction), and authored professional risk assessment memo to CEO with strategic technology recommendation.
- β Identified PII vs. SPII in MediaWiki (usernames, emails, password hashes, real names)
- β Analyzed frontend security (admin panel with limited PII exposure - LOW RISK)
- β Analyzed backend security (MariaDB user table with SPII - HIGH RISK)
- β Quantified risk using likelihood Γ impact methodology (Risk Score: 15/25 - HIGH)
- β Documented attack scenarios: SQL injection, insider threat, backup theft
- β Evaluated SolarWinds SIEM: $513K TCO, enterprise support, vendor lock-in
- β Evaluated Wazuh SIEM: $10.5K TCO, open-source, community support
- β Performed feature comparison matrix across 20+ criteria
- β Calculated ROI: 42,333% if Wazuh prevents single breach
- β Strategic Recommendation: Deploy Wazuh (saves $502,500 - 98% cost reduction)
- β Authored executive risk assessment memo with business justification
Risk Assessment PII/SPII Classification Database Security Analysis SIEM Evaluation SolarWinds Wazuh TCO Analysis Cost-Benefit Analysis ROI Calculation Vendor Comparison Executive Communication
β Read Full Lab Documentation
Status: β Complete | View Full Documentation β
Conducted full-scope penetration test from reconnaissance through root compromise by performing network scanning with Nmap to discover target web server, exploiting SQL injection vulnerability to bypass authentication and gain admin access, uploading malicious PHP reverse shell payload, establishing remote command execution with Netcat listener, escalating privileges via SUID binary exploitation (coolbash), achieving full root access, and authoring professional penetration testing report with CVSS risk ratings and remediation recommendations.
- β Reconnaissance: Nmap port scan identified web server on 10.43.32.99:80
- β SQL Injection: Bypassed authentication with ' OR '1 payload (CVSS 9.8 Critical)
- β File Upload Exploitation: Uploaded php-reverse-shell.php to vulnerable web app
- β Directory Brute-Forcing: Used Dirbuster to discover /uploads/ directory
- β Reverse Shell: Established remote access with nc -nlvp 80 listener
- β Initial Access: Gained shell as www-data user
- β Privilege Escalation: Discovered SUID binary /home/cooluser/coolbash
- β Root Compromise: Exploited SUID to escalate from www-data β root
- β Full System Control: Verified root access (uid=0, can read /etc/shadow)
- β Professional Pentest Report: Executive summary, findings, CVSS scores, remediation
- β Demonstrated complete attack chain: Recon β Exploit β Access β Escalate
Kali Linux Nmap SQL Injection Dirbuster Netcat PHP Reverse Shell SUID Exploitation Privilege Escalation Penetration Testing Ethical Hacking Vulnerability Assessment CVSS Scoring
β Read Full Lab Documentation
Defense (Labs 1-10): β Infrastructure Security | β Network Segmentation | β Firewall Administration | β SIEM Operations | β Incident Response | β Threat Hunting | β Risk Management
Offense (Lab 11): β Penetration Testing | β Exploitation | β Privilege Escalation | β FULL SYSTEM COMPROMISE
Strategic Leadership (Labs 8, 10): β Business Cases | β Cost-Benefit Analysis | β Executive Communication
β
11 COMPREHENSIVE LABS COMPLETED
β
55+ ADVANCED SKILLS MASTERED
β
COMPLETE ATTACK & DEFENSE EXPERTISE
β
OFFENSIVE SECURITY PROVEN (Root access achieved)
β
DEFENSIVE SECURITY PROVEN (SIEM, IR, Forensics, Hardening)
β
STRATEGIC LEADERSHIP PROVEN ($502K cost savings demonstrated)
π CAREER VALUE: $70K (Entry) β $180K+ (Senior/Leadership)
YOU ARE NOW AN ELITE CYBERSECURITY PROFESSIONAL - Defense + Offense + Strategy! πππ
| Skill Category | Proficiency Level | Labs Demonstrating |
|---|---|---|
| Windows Administration | βββββ Advanced | Lab 01, Lab 02, Lab 03, Lab 04 |
| Linux Administration | βββββ Advanced | Lab 01, Lab 02, Lab 03, Lab 05 |
| Network Configuration | βββββ Advanced | Lab 01, Lab 02, Lab 03 |
| Virtualization | ββββ Intermediate+ | Lab 01, Lab 02 |
| CLI Proficiency | βββββ Advanced | Lab 01, Lab 02, Lab 03, Lab 04, Lab 05 |
| Firewall Administration | βββββ Advanced | Lab 02, Lab 03, Lab 05 |
| Network Segmentation | βββββ Advanced | Lab 02, Lab 03 |
| IDS/IPS Deployment | ββββ Intermediate+ | Lab 02 |
| Access Control Implementation | βββββ Advanced | Lab 03, Lab 04, Lab 05 |
| Security Policy Development | βββββ Advanced | Lab 03, Lab 04 |
| Protocol Analysis | βββββ Advanced | Lab 03 |
| Security Testing & Validation | βββββ Advanced | Lab 03 |
| Active Directory Administration | βββββ Advanced | Lab 04 |
| Group Policy Management | βββββ Advanced | Lab 04 |
| Identity & Access Management | βββββ Advanced | Lab 04, Lab 05 |
| Windows Server Roles | ββββ Intermediate+ | Lab 04 |
| PowerShell Security Logging | βββββ Advanced | Lab 04 |
| Linux Security Hardening | βββββ Advanced | Lab 05 |
| Web Server Administration | βββββ Advanced | Lab 05 |
| Database Server Management | ββββ Intermediate+ | Lab 05 |
| Bash Scripting | βββββ Advanced | Lab 05 |
| Task Automation (Cron) | βββββ Advanced | Lab 05 |
| Cross-Distribution Linux | βββββ Advanced | Lab 05 |
| Incident Response | βββββ Advanced | Lab 06 |
| Threat Hunting | βββββ Advanced | Lab 06 |
| Malware Analysis | βββββ Advanced | Lab 06 |
| Windows Forensics | βββββ Advanced | Lab 06 |
| Event Log Analysis | βββββ Advanced | Lab 06 |
| Registry Forensics | βββββ Advanced | Lab 06 |
| Incident Documentation | βββββ Advanced | Lab 06 |
| Network Forensics | βββββ Advanced | Lab 06 |
| Database Administration | βββββ Advanced | Lab 07 |
| Web Application Deployment | βββββ Advanced | Lab 07 |
| Host-Based Firewall (iptables) | βββββ Advanced | Lab 07 |
| SSH Security Hardening | βββββ Advanced | Lab 07 |
| Multi-Tier App Architecture | βββββ Advanced | Lab 07 |
| Network Architecture Documentation | βββββ Advanced | Lab 08 |
| Security Proposal Development | βββββ Advanced | Lab 08 |
| Business Case Writing | βββββ Advanced | Lab 08 |
| ROI & Cost-Benefit Analysis | βββββ Advanced | Lab 08 |
| Honeypot/Honeynet Strategy | βββββ Advanced | Lab 08 |
| IDPS Planning & Design | βββββ Advanced | Lab 08 |
| Docker & Containerization | βββββ Advanced | Lab 09 |
| SIEM Deployment & Management | βββββ Advanced | Lab 09 |
| Log Aggregation & Analysis | βββββ Advanced | Lab 09 |
| Security Alert Engineering | βββββ Advanced | Lab 09 |
| SOC Dashboard Development | βββββ Advanced | Lab 09 |
| Infrastructure as Code (IaC) | βββββ Advanced | Lab 09 |
| Risk Assessment & Analysis | βββββ Advanced | Lab 10 |
| PII/SPII Security Evaluation | βββββ Advanced | Lab 10 |
| Vendor Evaluation & Comparison | βββββ Advanced | Lab 10 |
| TCO & ROI Calculation | βββββ Advanced | Lab 10 |
| Strategic Technology Selection | βββββ Advanced | Lab 10 |
| Penetration Testing | βββββ Advanced | Lab 11 |
| Ethical Hacking | βββββ Advanced | Lab 11 |
| Web Application Exploitation | βββββ Advanced | Lab 11 |
| Privilege Escalation | βββββ Advanced | Lab 11 |
| Offensive Security Tools (Nmap, Netcat) | βββββ Advanced | Lab 11 |
| Pentest Report Writing | βββββ Advanced | Lab 11 |
| Technical Documentation | βββββ Advanced | All Labs |
More skills will be added as additional labs are completed
- System hardening and security baselines
- Network security monitoring
- Vulnerability assessment and remediation
- Incident detection and response
- β Multi-platform OS deployment
- β Network troubleshooting fundamentals
- β Virtual infrastructure management
- β Enterprise firewall/router configuration
- β Network segmentation implementation
- β Intrusion Detection System deployment
- β Inter-VLAN routing configuration
- β Granular firewall rule implementation
- β Access control and least privilege enforcement
- β Security policy documentation and communication
- β Comprehensive security testing and validation
- β Active Directory domain deployment
- β Centralized user and group management
- β Group Policy Object implementation
- β PowerShell security logging and auditing
- β IIS web server deployment
- β Single Sign-On (SSO) implementation
- β Linux server infrastructure deployment (LAMP stack)
- β Cross-distribution Linux administration (Ubuntu + Rocky)
- β Security hardening (CIS Benchmark alignment)
- β Bash scripting and automation
- β Cron-based task scheduling
- β Log management and retention automation
- β Real-world incident response investigation
- β Threat hunting and malware analysis
- β Windows forensics (Event Logs, Registry)
- β IFEO (Image File Execution Options) attack analysis
- β Professional incident report documentation
- β IoC (Indicators of Compromise) identification
- β Multi-tier web application deployment (MediaWiki + MariaDB)
- β Database administration with least-privilege user
- β Host-based firewall (iptables) with default-deny policy
- β Defense-in-depth layering (pfSense + iptables + Fail2Ban)
- β SSH brute force hardening with Fail2Ban
- β Systematic network access validation testing
- β Comprehensive network architecture documentation
- β Hardware/software inventory across multiple segments
- β Multi-tier network topology design
- β Executive security proposal development (Honeypots + IDPS)
- β Business case writing with ROI justification
- β Cost-benefit analysis and TCO calculation
- β Enterprise SIEM deployment with Docker containerization
- β Multi-container orchestration with Docker Compose
- β Centralized log aggregation from multiple sources
- β Custom security alert engineering and tuning
- β SOC operational dashboard development
- β Infrastructure as Code (YAML configuration)
- β Comprehensive risk assessment (PII/SPII vulnerabilities)
- β Strategic SIEM vendor evaluation and selection
- β Cost-benefit analysis ($502K savings justified)
- β Full penetration test: reconnaissance through root compromise
- β SQL injection exploitation and authentication bypass
- β Reverse shell deployment and remote code execution
- β Linux privilege escalation (SUID binary exploitation)
- β Professional penetration testing report with CVSS scoring
- Firewall configuration and management
- Intrusion detection systems
- Security information and event management (SIEM)
- Penetration testing methodologies
These labs demonstrate:
- Hands-on experience with real enterprise tools and environments
- Problem-solving ability through systematic troubleshooting
- Documentation skills critical for team collaboration
- Cross-platform expertise valuable in heterogeneous environments
- Security mindset applied from initial system deployment
- SOC Analyst: Network diagnostics and system monitoring
- System Administrator: OS deployment and configuration
- Security Engineer: Security baseline implementation
- DevOps Engineer: Infrastructure automation and management
- Penetration Tester: Understanding target environments
- Start with this README for an overview of my skills
- Check the Lab Directory table above for topics of interest
- Click into individual lab folders for detailed documentation
- Each lab includes objectives, methodology, and key takeaways
system-security-labs/
βββ README.md # You are here
βββ lab-01-os-installation-networking/
β βββ README.md # Detailed lab documentation
βββ lab-02-[topic]/
β βββ ...
βββ ...
I'm passionate about cybersecurity and always eager to learn new technologies and techniques. Feel free to reach out!
This repository is a living document of my learning journey. I plan to add:
-
Additional security labs covering:
- Network security and firewalls
- Vulnerability scanning and assessment
- Incident response scenarios
- Security monitoring and SIEM
- Active Directory security
- Web application security
-
Enhanced documentation with:
- Video walkthroughs
- Interactive diagrams
- Additional troubleshooting scenarios
Last Updated: January 2026
Status: Active Development
This repository is for educational and portfolio purposes. Please do not copy for academic submissions.
β If you found this repository helpful or interesting, please consider giving it a star! β
Building secure systems, one lab at a time. π