0xNeelDatasets for Threat Detection ResearchIn the last couple of decades, various datasets have been created for threat detection and each has its advantages and limitations. Out of…11 min read·Nov 22, 2023----
0xNeelAWS Certified Cloud Practitioner — Notes (Part 2)Continuation of AWS Certified Cloud Practitioner — Notes (Part 1)13 min read·Nov 21, 2022----
0xNeelAWS Certified Cloud Practitioner — NotesI started preparing for this certification in Jan 2022 with the help of a course on A Cloud Guru. Thanks to them for wonderful courses and…7 min read·Apr 3, 2022----
0xNeelPrivilege Escalation Enumeration ChecklistBelow is my OSCP Basic Enumeration checklist for privilege escalation:6 min read·May 16, 2020----
0xNeelA curated list of Windows Security Event IDsThis is my personal project to prepare a list of Windows Security Event IDs and use cases around these event IDs. It is still under…2 min read·May 16, 2020----
0xNeelMalicious PowerShell Usage DetectionIn cyberattacks, PowerShell is often used to run malicious code stealthily on a target computer, but calling powershell.exe can be…4 min read·May 16, 2020----
0xNeelHackTheBox — DevOops WalkthroughFollowing is the HackTheBox DevOops machine’s walkthrough5 min read·Sep 8, 2019--1--1
0xNeelHackTheBox — Beep WalkthroughFollowing is the HackTheBox Beep machine’s walkthrough.2 min read·Aug 22, 2019----
0xNeelHachTheBox — Devel WalkthroughFollowing is the HackTheBox Devel machine’s walkthrough.3 min read·Aug 22, 2019----