Skip to content
cyberknight / 91
Projects · 07

Public work.

Every repository follows the same rule: if I publish the attack, I publish the detection. No labs without a blue-team counterpart.

projects ~ index
./projects/ ad-attack-detection

Active Directory attacks and the detections that catch them.

Kerberoasting, AS-REP Roasting, Pass-the-Hash and DCSync executed end-to-end in a lab AD. Every step ships with Sigma + Elastic EQL detections and a hardening playbook.

active-directoryimpacketrubeuselastic
github.com/cyberknight91/ad-attack-detection cd ./ad-attack-detection ↵
./projects/ siem-homelab

Dockerised SOC. One docker compose up and you have a working detection stack.

Wazuh 4.8 + OpenSearch + Suricata + Filebeat — the full ingestion, parsing and dashboard chain ready to spin up a SOC in minutes.

dockerwazuhopensearchsuricata
github.com/cyberknight91/siem-homelab cd ./siem-homelab ↵
./projects/ detection-engineering

Sigma and YARA rule library built for production, not demos.

Full MITRE ATT&CK mapping, test cases, real false-positive notes and baselines tuned on office traffic.

sigmayaramitre-att&ck
github.com/cyberknight91/detection-engineering cd ./detection-engineering ↵
./projects/ ctf-writeups

HTB and TryHackMe through a purple-team lens.

Every writeup ships with the exploit chain (CVE-2007-2447, MS17-010…) and the detection you would deploy in a real SOC.

htbthmwriteupsdetection
github.com/cyberknight91/ctf-writeups cd ./ctf-writeups ↵
./projects/ osint-audit

Unified passive reconnaissance in a single Python tool.

Subdomains, exposure surface and technology fingerprinting. JSON output ready to feed reporting pipelines.

pythonosintrecon
github.com/cyberknight91/osint-audit cd ./osint-audit ↵
./projects/ report-pipeline

Automated technical report pipeline in LaTeX.

JSON input → delivery-ready PDF output, with corporate identity and professional layout. Built for audit reports at scale.

pythonlatexpdflatexreporting
github.com/cyberknight91/report-pipeline cd ./report-pipeline ↵