Charlemagne-ai
.
  • ABOUT
  • PROJECTS
  • BLOG
  • APT
Charlemagne-ai
.
  • ABOUT

  • PROJECTS

  • BLOG

  • APT

Projects

Explore my hands-on cybersecurity projects and experiences

Filter by Technology

Threat hunt: Unauthorized TOR usage - Project Preview

Threat hunt: Unauthorized TOR usage

Microsoft Defender / Azure / KQL

View Project →
Windows 10 STIG Compliance & Remediation - Project Preview

Windows 10 STIG Compliance & Remediation

Tenable Nessus / Azure

View Project →
The Arena - Web Application Attack Simulation Lab - Project Preview

The Arena - Web Application Attack Simulation Lab

Burp Suite / Linux / Apache / MySQL / PHP

View Project →
AWS T-Pot Honeypot Deployment & Analysis - Project Preview

AWS T-Pot Honeypot Deployment & Analysis

AWS / T-Pot Honeypot / Threat Visualization

View Project →
End-to-End Vulnerability Management Program Implementation - Project Preview

End-to-End Vulnerability Management Program Implementation

Tenable / Azure VM / PowerShell / Bash

View Project →
Active Directory Penetration Testing Lab (In Progress) - Project Preview

Active Directory Penetration Testing Lab (In Progress)

Active Directory / VirtualBox / Penetration Testing / Kali Linux / Metasploit

View Project →
Charlemagne-ai
.

Bridging cybersecurity and emerging technologies to secure innovation.

< /> SECURED BY QUANTUM ENCRYPTION