You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for network administrators and security companies to block threats and protect against DDoS attacks.
A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.
Designed and implemented a secure, scalable web application infrastructure on Microsoft Azure. Deployed Docker containers running DVWA behind a load balancer for high availability, secured with Network Security Groups and a Jump Box. Automated deployment with Ansible, focusing on cloud security best practices.