Skip to content
View willcyber756's full-sized avatar

Block or report willcyber756

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
willcyber756/README.md
$ whoami
> Cybersecurity student building toward SOC analyst role
> Focused on log analysis, detection engineering, and incident response
> Documenting every lab publicly — no shortcuts, no gatekeeping

🛠️ Tools & Platforms

Splunk Wireshark Kali Linux CompTIA Linux GitHub


🔬 Currently Building

  • 🔍 SSH brute-force detection lab using Splunk SPL queries
  • 📡 Packet analysis walkthroughs with Wireshark — documented with findings
  • 📚 CompTIA Network+ domain-by-domain study notes (publicly tracked)
  • 🛡️ Incident response playbook templates based on real scenarios

📁 Lab Repo Structure

Every lab in this profile follows the same format:

Section What's Inside
Objective What threat or scenario the lab simulates
Environment Tools, OS, versions used
Steps Numbered walkthrough with screenshots
Key Findings What was detected and how
SPL / Commands Actual queries and commands used
Lessons Learned Honest reflection on what I learned

📌 Pinned Labs & Projects

🔴 splunk-ssh-brute-force-lab — Detecting SSH brute-force with Splunk SPL
🟡 wireshark-packet-analysis — PCAP walkthroughs with annotated findings
🟢 network-plus-study-notes — Network+ notes by domain, built in public
🔵 soc-home-lab-setup — Full home lab documentation and config


🤝 Connect With Me

Instagram Threads

💼 Open to SOC Analyst opportunities


Every commit here is a real lab. Every repo is a real skill.

Popular repositories Loading

  1. willcyber756 willcyber756 Public