Skip to content
View PaidDues's full-sized avatar

Block or report PaidDues

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
PaidDues/README.md

Max Dues | Security Projects and Technical Writeups

I'm passionate about cybersecurity and love tackling complex challenges through hands-on projects. From vulnerability management to threat detection, these projects allow me to dive deep into the ever-evolving landscape of cybersecurity. Please feel free to check them out and see the work I’ve put into enhancing security operations and processes!

πŸ•΅πŸΌβ€β™‚οΈ Submitted Responsible Disclosures (Sanitized) & Information Security Advisories

πŸ•΅πŸΌβ€β™‚οΈ Enterprise Vulnerability Management Projects

πŸ”¬ Threat Hunting / Incident Response & Recovery Projects

🧰 Security Compliance & Automation Projects

πŸ“š Certifications / Continued Education

πŸ” How I Stay Up To Date With The Industry

πŸ’Ž Resources I Recommend

Popular repositories Loading

  1. PaidDues PaidDues Public

  2. Vulnerability-Management-Program Vulnerability-Management-Program Public

  3. PII-Exposure-via-Clipboard-Entries-Submitted-Disclosure-Sanitized-Real-World-Case-Study- PII-Exposure-via-Clipboard-Entries-Submitted-Disclosure-Sanitized-Real-World-Case-Study- Public

    End-to-end Report: vulnerability description β†’ attack path β†’ business impact β†’ control mappings (NIST 800-53/ISO 27001) β†’ risk assessment β†’ risk strategy β†’ prioritized remediation β†’ verification, v…

  4. STIGS STIGS Public

    Showcase of DISA STIG remediations

    PowerShell

  5. Security-Advisory---QR-Code-Overlay Security-Advisory---QR-Code-Overlay Public

    A security advisory on the growing, but overlooked threat of malicious QR code overlays targeting industries such as travel, hotel, personal banking, restaurant, clinics, and more.

  6. threat-hunting-scenario-tor-internal-threat threat-hunting-scenario-tor-internal-threat Public

    Threat hunt report investigating unauthorized internal Tor Browser usage on a corporate endpoint using Microsoft Defender for Endpoint and KQL