Skip to content
View SancLogic's full-sized avatar

Highlights

  • Pro

Block or report SancLogic

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SancLogic/README.md

Hello, I'm Mohammed

About Me

I break things in the lab and investigate real incidents when they happen. Investigations, threat hunting, and understanding attacks from both sides.


Currently

Role Organization
SOC Analyst Intern (Tier 2) | Adversary Simulation MYDFIR
SOC Intern / CTF Engineer (Contract) LOG(N) Pacific Cyber Range

Projects

Project Description
The Azuki Breach Saga 4-part CTF series, 91 flags, 8-day ransomware intrusion, full kill chain investigation in MDE
30-Day SOC Challenge ELK Stack, 100K+ attacks captured, Mythic C2 simulation, custom detections
SOC & Honeynet in Azure Live SOC environment in Azure, real attack traffic, threat detection, compliance mapping
SOC Cyber Range Investigations Real-world threat activity investigated through hands-on detection and response inside a student cyber range
KDC Simulated Attack Purple team exercise, 11-hour intrusion, 4 telemetry sources, 31 MITRE techniques, 5 detection rules
VHR-001 STORM-2603 Healthcare Ransomware Simulation Full kill chain simulation modelling Storm-2603 healthcare targeting
Kerning City Dental External black box pentest, 11 findings, full kill chain from recon to C2 in 61 minutes

Case Files

Real incident investigations, not labs.

Investigation Summary
DCSync Domain Compromise mimikatz, lsass.exe, RemCom lateral movement, full domain takeover
AnyDesk Persistence 19-day persistence on Domain Controller, scheduled task abuse
XorDDoS Botnet 6 Linux VMs compromised, 120K targeted IPs, Microsoft abuse notification, 5 Sentinel rules deployed
Entra ID Credential Attack Tor exit node signins, MFA bypass attempts, geo anomalies
WordPress PHP Backdoor TERMOREK-IT shell upload, web server compromise
Phishing Campaign Analysis Discord CDN payload delivery, typosquat domain
Linux Cryptominer Forensics Memory analysis, IRC C2, mining pool connections
KDC Investigation Report Purple team investigation, 11-hour intrusion, Sliver C2, credential dumping, exfil via Discord
MTS-PC-1 Stealc/Clipper Compromise Memory forensics, 202 process injections, clipboard hijacker, TRON wallet theft
MTS-Web Server Compromise Linux memory forensics, rootkit deployment, XMRig cryptominer, deleted binaries in memory
WeTransfer Phishing Analysis Email analysis, WeTransfer impersonation, Turkish phishing kit, Document.zip payload
SWEEP Influencer Campaign Two-stage phishing, YouTube creator targeting, credential harvesting, infrastructure OSINT

Tools


Training

Course Focus
MYDFIR SOC Analyst (90-Day) Splunk, investigation methodology, Sigma/YARA, incident response
TCM Security SOC Level 1 Phishing analysis, Wireshark, endpoint security
Antisyphon SOC Core Skills Windows/Linux forensics, memory forensics, AD analysis

FIND EVIL. BUILD DEFENSES.
Offense. Defense. Logic.

Popular repositories Loading

  1. Soc-Honeynet-Azure Soc-Honeynet-Azure Public

    1

  2. Windows-Privilege-Escalation-Resources Windows-Privilege-Escalation-Resources Public

    Forked from TCM-Course-Resources/Windows-Privilege-Escalation-Resources

    Compilation of Resources from TCM's Windows Priv Esc Udemy Course

    1

  3. SancLogic SancLogic Public

  4. SOC-Cyber-Range-Investigations SOC-Cyber-Range-Investigations Public

    Reports, detections, and simulations from SOC lab investigations and cyber range exercises using Sentinel, Defender, KQL, and Azure.

  5. Linux-Privilege-Escalation-Resources Linux-Privilege-Escalation-Resources Public

    Forked from TCM-Course-Resources/Linux-Privilege-Escalation-Resources

    Compilation of Resources for TCM's Linux Privilege Escalation course

  6. vpr-toolkit vpr-toolkit Public

    Forked from 0xvpr/vpr-toolkit

    Toolkit for various reverse engineering & hacking related tasks.

    Python