port254

Cybersecurity Research

Threat Intelligence | Active Directory | OT/ICS Security | IEC 62443

Honeypot Dashboard

Real-time threat intelligence from SSH, S7, Modbus, MQTT, and HMI honeypots. Track attack patterns, compromised credentials, and attacker behavior.

View Dashboard →

BloodHound Analysis

Active Directory attack path visualization and analysis. Explore domain relationships, identify privilege escalation paths, and understand AD security posture.

Launch BloodHound →

File Analysis

Multi-engine malware scanning with ClamAV and VirusTotal integration. Analyze suspicious files and correlate with honeypot-collected samples.

Analyze Files →

Incident Playbooks

Documented incident response procedures for ransomware, data breaches, phishing, and insider threats with detection and containment steps.

View Playbooks →

MITRE ATT&CK Matrix

Interactive ATT&CK framework mapping of observed techniques from honeypot data. Track adversary tactics and techniques in real-world attacks.

Explore Matrix →

OSEP/OSCP Toolkit

Comprehensive collection of 91 security tools used during Offensive Security certifications. Categorized by purpose with detailed descriptions.

Browse Tools →