Archives

Azure-based Suspicious Login Detection System

Overview This project replicates a real-world Security Operations Center (SOC) environment by simulating, detecting, and alerting on suspicious login activity using Azure Sentinel, Log Analytics, and Logic Apps — all within the Azure Free Tier. The goal was to simulate threats like: Multiple failed logins (brute-force attempts) Logins from unusual locations Off-hour access behavior I…

Read More

Windows Event Log Monitoring and Alerting via PowerShell

Overview This project focuses on building a PowerShell-based automation to monitor Windows Event Logs — specifically targeting failed login attempts (Event ID 4625). The script reads the Security log, extracts recent failed logins, and sends a real-time email alert if any are found. It runs silently in the background every 5 minutes using Task Scheduler….

Read More

Azure-based Website View Counter

Overview This project demonstrates how to build a real-time, serverless view counter for a website using Microsoft Azure. The counter tracks each page visit securely and displays the data live on a WordPress-based portfolio. It serves as a practical example of combining cloud computing, API development, and secure serverless architecture in one seamless solution. As…

Read More

MAC Address Changer

Overview A MAC address changer is a software tool or command-line utility that allows a user to modify or spoof the MAC (Media Access Control) address of a device’s network interface card (NIC). The MAC address is a unique identifier assigned by the manufacturer, and it plays a key role in network communication at the…

Read More

Encryption Methods Using Python

Simulate different Encryption methods here ➚ Overview Encryption methods can be broadly categorized into symmetric, asymmetric, and hashing (non-reversible transformations). 🔐 1. Symmetric Key Encryption Single key used for both encryption and decryption. Fast and suitable for bulk data encryption. Key must be securely shared between parties. Examples: AES (Advanced Encryption Standard): Block cipher, 128-bit…

Read More

Keystroke Logging Using Python

Overview A keylogger is a type of surveillance software that records every keystroke made on a system’s keyboard. Keyloggers can be used for both legitimate purposes like user activity monitoring or testing, and malicious intent such as stealing sensitive data. In this project, I developed a Python-based keylogger using the pynput library. The program captures…

Read More