Skip to content
View 0xAll3nC's full-sized avatar
  • Arlington, VA

Highlights

  • Pro

Block or report 0xAll3nC

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Threat-Intelligence-and-Reconnaissance-Automation-Tool Threat-Intelligence-and-Reconnaissance-Automation-Tool Public

    An automation tool for threat intelligence gathering and adversary emulation. Leverages VirusTotal API and headless browser automation to analyze URLs, capture screenshots, and generate structured …

    Python

  2. Microsoft-Defender-for-Endpoint-MDE-VM-Onboarding-Isolation-and-Investigation-Lab Microsoft-Defender-for-Endpoint-MDE-VM-Onboarding-Isolation-and-Investigation-Lab Public

    Hands-on lab demonstrating Microsoft Defender for Endpoint (MDE) onboarding, manual VM isolation, and endpoint investigation techniques including alert triage, evidence collection, and attack surfa…

    1

  3. Remote-Code-Execution-Detection-via-MDE Remote-Code-Execution-Detection-via-MDE Public

    Simulated a PowerShell-based Remote Code Execution (RCE) attack and built a custom detection pipeline using Microsoft Defender for Endpoint (MDE) and Kusto Query Language (KQL). Demonstrated real-t…

  4. Windows-Programmatic-Vulnerability-Remediation-Automated-Hardening-using-PowerShell-Tenable Windows-Programmatic-Vulnerability-Remediation-Automated-Hardening-using-PowerShell-Tenable Public

    an automated vulnerability remediation workflow on a Windows 10 VM using PowerShell scripts and Tenable authenticated scans. Vulnerabilities such as outdated software (e.g., Firefox) and legacy pro…

    PowerShell