PinnedJeremy PowersMapping out attackers using a honeypot and Azure SentinelIn this blog, I setup Azure Sentinel (SIEM) and connect it to a live virtual machine acting as a honey pot. With this, you can observe live…Jan 2, 2023Jan 2, 2023
PinnedJeremy PowersVulnerability management with NessusIn this blog I will cover vulnerability scanning and vulnerability remediation. These are two of the main steps in the Vulnerability…Jan 3, 2023Jan 3, 2023
PinnedJeremy PowersHow To Setup ELK | Elastic Agents & Sysmon for CybersecurityIn this blog entry, I will show how you can set up ELK for cybersecurity purposes. ELK is an acronym that stands for Elasticsearch…May 26, 2023May 26, 2023
PinnedJeremy PowersKasm: Docker Containers streaming Kali Linux to your browserKasm Workspaces is a container streaming platform. Users access UI based containers through the web-native platform. With Kasm, users can…May 27, 2023May 27, 2023
Jeremy PowersBasic Keylogger using PythonIn this blog, I will briefly explain what a keylogger is and then show you a basic keylogger I made using Python.Jan 2, 2023Jan 2, 2023