Skip to content
View menotafari's full-sized avatar
🏠
Working from home
🏠
Working from home

Highlights

  • Pro

Block or report menotafari

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Voice-Vault-Note Voice-Vault-Note Public

    Python 1

  2. Remote-and-Local-Exploitation-Lab Remote-and-Local-Exploitation-Lab Public

  3. Investigation-SOC141 Investigation-SOC141 Public

    This lab, part of the LetsDefend platform, focuses on identifying, investigating, and mitigating threats related to suspicious URL activity. Participants will analyze logs, research malicious domai…

  4. Detection-Lab-1 Detection-Lab-1 Public

    Forked from Test-MyDFIR/Detection-Lab

  5. SOC166---Javascript-Code-Detected-in-Requested-URL SOC166---Javascript-Code-Detected-in-Requested-URL Public

    This LetsDefend lab focuses on investigating a JavaScript injection (XSS) attack targeting a webserver. The lab involves analyzing logs, identifying malicious payloads, validating Indicators of Com…

  6. SOC168---Whoami-Command-Detected-in-Request-Body SOC168---Whoami-Command-Detected-in-Request-Body Public

    Description: This lab focuses on investigating an OS Command Injection attack where the "whoami" command was detected in the HTTP request body. The analysis involves reviewing server logs, identify…