Projects
Project #01
File Integrity Monitoring (FIM) using Wazuh
File Integrity Monitoring (FIM) is a crucial security feature that
tracks and detects unauthorized changes to critical files and directories.
It continuously monitors files for modifications, additions, and deletions,
ensuring that any unexpected or suspicious changes are quickly identified.
FIM helps organizations maintain the integrity of their systems, prevent
unauthorized access, and meet compliance requirements such as PCI-DSS, HIPAA,
and GDPR. It generates real-time alerts, enabling security teams to investigate
potential threats before they escalate.
Project #02
Vulnerability Detection (VD) using Wazuh
Vulnerability Detection (VD) identifies weaknesses within an organization’s
systems and applications by scanning software versions, configurations, and
installed packages. It compares these elements against a comprehensive
vulnerability database, such as the National Vulnerability Database (NVD),
to detect known security flaws. By providing detailed reports on discovered
vulnerabilities, Wazuh enables organizations to prioritize remediation efforts,
minimize attack surfaces, and maintain a robust security posture. This proactive
approach helps prevent exploitation by cybercriminals.
Project #03
Brute Force Attack (BFA) Detection using Wazuh
Brute Force Attack Detection (BFA) identifies and alerts security teams to repeated login attempts aimed at guessing passwords or gaining unauthorized access to systems and applications. It monitors authentication logs and network traffic for patterns indicative of brute force attacks, such as multiple failed login attempts from a single IP address within a short time frame. By detecting these attacks early, Wazuh helps organizations prevent unauthorized access, secure sensitive data, and maintain system availability. Security teams can also configure automatic responses, such as blocking the attacker’s IP address.
Project #04
Malware Detection (MD) through VirusTotal Integration using Wazuh
Malware Detection (MD) integrates with VirusTotal, a leading threat intelligence platform, to identify malicious files and processes within an organization’s systems. Wazuh collects file hashes and sends them to VirusTotal, which analyzes the hashes using its vast database of malware signatures from multiple antivirus engines. If a match is found, Wazuh generates an alert, enabling security teams to quickly respond and remove the threat. This integration enhances an organization’s malware detection capabilities by leveraging collective intelligence from global security vendors.
Project #05
Monitoring Execution of Malicious Commands (MC) using Wazuh
Monitoring Execution of Malicious Commands (MC) detects and alerts security teams when suspicious or unauthorized commands are executed on monitored systems. By analyzing system logs and shell command histories, Wazuh identifies commands commonly used in cyberattacks, such as privilege escalation attempts, reverse shells, and data exfiltration scripts. This feature helps organizations detect attacks in their early stages, preventing unauthorized access, data breaches, and system compromise. Security teams can configure custom rules to detect specific command patterns relevant to their environment.
Project #06
Blocking Known Malicious Actors (MA) using Wazuh
Blocking Known Malicious Actors (MA) prevents connections from IP addresses and domains associated with cybercriminals, malware distribution, and other malicious activities. Wazuh maintains an up-to-date threat intelligence database that includes known malicious entities, sourced from reputable providers such as AlienVault OTX and AbuseIPDB. When a monitored system detects traffic from a listed IP address or domain, Wazuh can automatically block the connection and generate an alert. This proactive defense mechanism reduces the risk of unauthorized access, data theft, and malware infections.
Project #07
PyPortScanner (PyPS)
PyPortScanner is a simple Python-based network tool designed to help network administrators and
security professionals perform port scanning on a target host. This tool allows users to scan a
list of specified ports on a given target host and provides information about the status of each
port (open or closed). It also displays well-known port descriptions for reference, making it a
useful tool for identifying potential vulnerabilities and discovering services running on the
target system.
Project #08
PassCracker
PassCracker is a powerful and versatile password-cracking tool designed to decode
various cryptographic hash functions commonly used in cybersecurity. Developed
using Python, PassCracker provides an efficient and user-friendly solution for
security professionals and ethical hackers to test the strength of passwords
stored in hash formats.
Project #09
PasswordGuard
PasswordGuard or Password Generator and Strength Checker is a versatile and user-friendly
Python application designed to help users enhance their online security by creating and
evaluating strong passwords. With the PasswordGuard utility, you can effortlessly generate
robust, random passwords or assess the strength of your existing passwords.
Project #10
PYMAF
PYMAF is an innovative technology project to elevate security, convenience,
and user identification in various applications and industries. This system
harnesses state-of-the-art computer vision and artificial intelligence
algorithms to identify and authenticate individuals based on facial features.