This project showcases a structured methodology for identifying vulnerabilities, including the steps of reconnaissance, scanning, and exploitation. This approach is tailored for penetration testing, Bug Bounty programs, and similar contexts.
This project involves installing Wazuh on a local Debian machine, configuring all key components including the server, indexer, and dashboard. Subsequently, rules and scripts are set up to detect alerts and incidents using Wazuh.
This two-pages website is about a fictional tech company built with HTML and CSS. This project helps me to become more comfortable with Bootstrap, CSS skills as flexbox and media queries