Cyber Rey
ACW803 Operation Blacktrace: Network Forensic of a PCAP File using Wireshark and NetworkMiner
ACW 802 Dynamic Malware Analysis & Behavioral Profiling Using FLARE VM | Full Lab Walkthrough
ACW802 How to Use Metasploit in establishing Persistence with Meterpreter - OperationShadowStrike P3
ACW802- How to use SEToolkit Credential Harvester for Spear Phishing Attack OperationShadowStrike P2
ACW802 - How to Simulate a DDoS Attack in Cybersecurity Lab - OperationShadowStrike P1
ACW802 - How to Install FLARE-VM using VirtualBox for Secure Malware Analysis Lab
WK 3 Lab 2: Cross-Origin Resource Sharing (CORS) Walkthrough — Hacktify Cybersecurity Internship
WK 3 Lab 1: Cross-Site Request Forgery (CSRF) Walkthrough — Hacktify Cybersecurity (HCS) Internship
WK 2 Lab 2: SQL Injection (SQLi) Hacktify Cybersecurity Internship Labs
WK 2 Lab 1: Insecure Direct Object References (IDOR) - Hacktify Cybersecurity Internship
WK 1 Lab 2: Cross-Site Scripting (XSS) Labs Walkthrough | Hacktify Internship
WK 1 Lab 1: HTML Injection - Hacktify CS Internship Walkthrough
Automating EC2 Instance Isolation with AWS Lambda and GuardDuty | Step-by-Step AWS Security Guide