VENOMOUSVIPER-LABS :: INITIALIZING LAB CONSOLE...
LOADING MODULES :: AD-LAB | CYBERLAB | VIPERKIT | VIPERAI INBOX
ACCESS LEVEL :: TIER-3 OPS
STATUS :: ONLINE
Stand by while the console loads…
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
[14:12:09] AD-LAB INFO New user test.tech created for GPO test
[14:13:44] AD-LAB INFO GPO 'LAB-Workstation-Baseline' linked to OU 'LAB-Workstations'
[14:15:02] CYBERLAB WARN Snapshot taken on DETONATION-01 before sample run
[14:17:29] CYBERLAB INFO Wazuh agent check-in from DETONATION-01 (rule set updated)
[14:19:34] CYBERLAB WARN Suspicious PowerShell command observed (encoded payload)
[14:21:55] VIPERKIT INFO Case #23 opened: Ransomware alert on WIN10-CL01
[14:23:02] VIPERKIT INFO HUNT tab: suspicious process tree captured for review
[14:24:41] VIPERKIT INFO SWEEP tab: autoruns and scheduled tasks snapshot exported
[14:26:01] VIPERKIT INFO Case #23 updated – persistence removed on WIN10-CL01
[14:27:48] VIPERKIT INFO HARDEN tab: basic hardening checklist marked complete
[14:29:10] VIPERAI-INBOX INFO New email submitted from CLIENT-01 (subject: 'Outstanding invoice')
[14:30:47] VIPERAI-INBOX ALERT URL pattern flagged as suspected credential harvest
[14:31:19] VIPERAI-INBOX INFO User-safe explanation generated for help desk ticket notes
[14:33:02] CYBERLAB INFO PCAP capture rotated for DETONATION-01
[14:34:55] AD-LAB INFO Test account 'lab.audit' added to Sec-Group 'LAB-HelpDesk'
[14:36:21] AD-LAB INFO Password policy 'LAB-Default-Domain' complexity rules updated
[14:37:44] CYBERLAB INFO Network capture started on interface eth0 (DETONATION-01)
[14:39:02] VIPERKIT INFO Case #24 opened: Unwanted remote tool detected on WIN10-CL02
[14:41:29] VIPERKIT INFO PERSIST tab: suspicious registry run key identified
[14:43:34] VIPERAI-INBOX WARN Email attachment contains suspicious macro code
[14:45:55] AD-LAB INFO New group 'LAB-SecOps' created for security testing
[14:47:02] CYBERLAB ALERT Alert rule triggered: possible lateral movement detected
[14:48:41] VIPERKIT INFO CLEANUP tab: temporary files removed from user profile
[14:50:01] VIPERAI-INBOX INFO Sender domain reputation check: low trust score
[14:51:47] AD-LAB INFO GPO refresh triggered for OU 'LAB-Servers'
[14:53:12] CYBERLAB INFO Malware sample detonated in isolated sandbox
[14:55:29] VIPERKIT INFO Case #24 updated – persistence mechanism removed
[14:57:34] VIPERAI-INBOX ALERT Multiple URL redirects detected – likely phishing campaign
[14:59:10] AD-LAB INFO User 'lab.admin' successfully authenticated to LAB-DC01
[15:01:44] CYBERLAB WARN Unusual outbound connection attempt blocked by firewall
[15:03:02] VIPERKIT INFO HARDEN tab: Windows Defender real-time protection verified
[15:05:29] VIPERAI-INBOX INFO Email analysis complete – risk score: HIGH
[15:07:34] AD-LAB INFO Security group membership audit completed for OU 'LAB-Users'
[15:09:55] CYBERLAB INFO System snapshot created: DETONATION-01-clean-baseline
[15:11:02] VIPERKIT INFO Case #25 opened: Suspicious scheduled task on WIN10-CL03
[15:13:41] VIPERAI-INBOX WARN Attachment file hash matches known malware signature
[15:15:01] AD-LAB INFO OU structure updated – new child OU 'LAB-Test-Machines' created
[15:17:48] CYBERLAB INFO Sysmon event log exported for analysis
[15:19:10] VIPERKIT INFO HUNT tab: active network connections enumerated
[15:21:47] VIPERAI-INBOX INFO Link analysis complete – 3 suspicious URLs flagged
VENOMOUSVIPER LABS
Cybersecurity Portfolio · Systems & Security Engineer

Jeremy Tarkington - Security Portfolio

Systems/Security Engineer specializing in incident response, SIEM/EDR, and security automation. Explore my projects below.

Cybersecurity Portfolio
Lake Charles, LA

Projects

AD LAB
Core Range
Active Directory Range

Multi-VM AD lab used for Group Policy, auth workflows, and attack/defense practice in a safe, rebuildable environment.

CYBERLAB
Detonation
Security Tooling & Detonation Lab

Isolated cyber lab for safely detonating malware, capturing endpoint and network telemetry, and rehearsing analysis workflows with Wazuh, PCAPs, and scripted runbooks.

12 DAYS OF CYBER
CTF
Holiday CTF Challenge Series

Progressive 12-day CTF with story-driven challenges covering encoding, hash cracking, log analysis, JavaScript deobfuscation, PowerShell malware, web recon, DNS tunneling, SQL injection, and more. Gated progression with flag-based unlocking.

VIPERKIT
IR Toolkit
Incident Response Toolkit

Portable desktop IR toolkit that walks techs through Hunt → Persist → Sweep → Cleanup → Hardening, with case tracking, reports, and audit trails built for real MSP incidents.

VIPERAI INBOX
AI Email Intel
AI-Powered Email & Phishing Analyzer

Local AI-powered phishing and attachment analyzer for real-world email tickets — drag and drop .eml/.msg to get technical findings, a user-friendly explanation, and clear recommended actions.

WAZUH RULES
SIEM/EDR
Custom Detection Rules

Custom Wazuh detection rules for identifying malicious PowerShell, persistence mechanisms, lateral movement, and credential theft. Tuned to reduce false positives while catching real threats.

PS ONE-LINERS
Quick Reference
50+ PowerShell IR Commands

Comprehensive collection of PowerShell one-liners for incident response, forensics, AD security, and threat hunting. Downloadable reference guide.

CHECKLISTS
Templates
Downloadable Assessment & IR Templates

Full CMMC L2 (110 checks), CIS benchmarks, IR playbooks, and report templates. All checklists downloadable for real-world use.

CODE SAMPLES
Scripts
PowerShell, Bash & Python

Collection of security automation scripts and IR tools. PowerShell for Windows forensics, Bash for system analysis, and Python for threat hunting and data processing.

WRITEUPS
HTB/THM
Case Studies & Technical Reports

Technical reports and case studies from HackTheBox, TryHackMe, and real-world engagements covering Active Directory exploitation, penetration testing, digital forensics, compliance (CMMC/NIST), and detection engineering.

Future Projects

🍯
In Development

ViperAI Honeypot

High-interaction LLM honeypot that imitates an internal AI assistant to attract attackers attempting prompt injection, data exfiltration, and tool abuse. Progressive disclosure of synthetic data while logging all attack techniques.

LLM Security Deception Threat Intelligence
🛡️
In Development

ViperAI Sentinel Local (VSL)

Zero-infrastructure local "mini EDR" for Windows endpoints. Combines hard rules with local ML anomaly detection to hunt persistence, LOLBins, and suspicious behavior. Read-only, encrypted logs, email alerts.

EDR ML Detection MSP-Focused

Technical Expertise

Incident Response & Remediation 90%
Detection Engineering (SIEM/EDR) 85%
Digital Forensics & Threat Hunting 80%
Active Directory Exploitation & Red Team 75%
GRC & Compliance (CMMC/NIST) 85%
Automation & Scripting (PowerShell/Bash/Python) 90%
Identity & Tenant Admin (M365/Entra/AD) 85%
Network Security & Zero-Trust 80%
Endpoint Lifecycle & Platform Engineering 85%

Certifications

CompTIA A+
Google IT Support
CompTIA Network+ In Progress
CompTIA Security+ In Progress
Jeremy Tarkington - Portfolio Terminal
Welcome to Jeremy Tarkington's Portfolio Terminal
Type 'help' for available commands or 'exit' to close
 
viper@labs:~$
💻 Try the Interactive Terminal!
Click the glowing "Terminal" button below to explore my skills and projects → Click here to dismiss