Skip to content
View VenalityXT's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report VenalityXT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
VenalityXT/README.md

Michael Guajardo

Cybersecurity • Network Defense • Detection Engineering • Adversary Simulation

"Simplicity is great—right up until it masks reality"
Inspired by the philosophy of Aras "Russ" Memisyazici


ABOUT

I build and analyze cybersecurity environments that mirror real enterprise operations, spanning network segmentation, firewall design, SIEM telemetry engineering, threat hunting, and detection development. I replicate full attack chains and use telemetry to observe systems under real-world adversarial techniques.

Whether designing architectures in Visio, tuning Snort/OPNsense, analyzing Sysmon/Winlogbeat logs in Splunk, or investigating suspicious network flows, my goal is to produce clear, actionable visibility. I combine engineering accuracy with analytical depth to detect and respond to hidden behaviors.


CYBERJON THE SNAKE

GitHub Snake

CERTIFICATIONS


SKILL MATRIX

🛡️ Detection and Monitoring

  • Splunk SIEM workflows
  • Sysmon and Winlogbeat pipelines
  • Endpoint behavior analysis
  • Correlation logic and detection development

🌐 Network Security

  • pfSense routing, NAT, and firewall policy
  • Snort IDS and IPS tuning
  • VLAN segmentation, ACL logic, VPN design
  • Cisco Packet Tracer enterprise topologies
  • Wireshark and TShark packet analysis

🧩 Network Architecture and Design

  • Layered routing (core, distribution, access)
  • DMZ, VPN, and honeynet mapping
  • High-fidelity Visio and draw.io diagrams
  • Logical and physical network mapping

💻 Systems and Infrastructure

  • Windows Server, AD DS, Group Policy
  • Linux administration and hardening
  • STIG-aligned configuration
  • Jumpbox and SSH workflow design
  • Disk partitioning and OS deployment

⚙️ Automation and Scripting

  • Python automation and analysis
  • PowerShell for endpoint and server orchestration
  • Bash and Shell scripting
  • Ansible-driven configuration

⚔️ Offensive Security Fundamentals

  • Kali Linux tooling
  • Metasploit Framework
  • Hydra and credential attacks
  • Exploit replication to validate detections

🏗️ Virtualization and Cloud

  • VMware, VirtualBox, Proxmox
  • Multi-VM enterprise simulation
  • AWS EC2, VPC, IAM, cloud networking
  • Azure fundamentals
  • Docker-based tooling

TOOLCHAIN


PROJECTS

Project Description Technologies
SOC Threat Detection Full SIEM pipeline with forwarding, parsing, detections, and triage logic. Splunk, Sysmon, Winlogbeat, Ansible
Uncomplicated Firewall and Network Configuration Multi-VLAN segmentation with ACLs, VPN, IDS, and layered security design. pfSense, Snort, OpenVPN
Red Team Exploitation Exploit chains replicated to understand attacker movement and validate detections. Kali Linux, Metasploit, Hydra
Vulnerability Management Dashboard Cloud scanning mapped to compliance with Python reporting. Nessus, Python, AWS

LAB SUMMARY

Mission Report

# ===================================================================
#                        SYSTEM MISSION REPORT
#                       Classification: NORMAL
# ===================================================================

Status: "OPERATION COMPLETE"
Integrity_Check: [OK]
Timestamp: "Scan_Complete"

Network_Engineering:
  Architectures_Designed.................: "100+"
  Enterprise_Topologies..................: "core, distribution, access, DMZ, VPN"
  VLAN_Environments......................: "30+"
  PacketTracer_Scenarios.................: "50+"
  Status.................................: "[OK]"

Virtualization:
  Virtual_Machines_Deployed..............: "60+"
  Hypervisors_Used.......................: "VirtualBox, Proxmox, VMware"
  Snapshot_Consistency...................: "[OK]"

Offensive_Simulations:
  Exploit_Chains_Replicated..............: "20+"
  Adversary_Behavior_Analysis............: "enabled"
  Simulation_Status......................: "[OK]"

Detection_Engineering:
  SIEM_Pipelines.........................: "ingest → parse → detect → visualize"
  Log_Sources............................: "Sysmon, Winlogbeat, Linux_Audit"
  Firewall_IDS...........................: "pfSense, Snort, ACL"
  Detection_Coverage.....................: "[IMPROVING]"

Architecture_Design:
  Diagrams_Created.......................: "Visio, draw.io"
  Complexity_Level.......................: "enterprise_grade"
  Design_Integrity.......................: "[OK]"

# ===================================================================
# Environments built to simulate realistic multi layer enterprise
# networks and support offensive and defensive cybersecurity testing.
# ===================================================================

Analyst_Signature: "VENALITYXT"
System_Verification: "PASSED"

Pinned Loading

  1. pfSense-Configuration-Lab pfSense-Configuration-Lab Public

    Simulating a real-world home or small office network using pfSense and VirtualBox.

    Shell

  2. SOC-Threat-Detection-Response SOC-Threat-Detection-Response Public

    This repository contains resources for a SOC Threat Detection and Response Lab, demonstrating threat detection with Splunk and automated response using Ansible. It includes Splunk dashboards, Ansib…

    1

  3. Red-Team-Tactics Red-Team-Tactics Public

    This repository contains the findings and results of a penetration testing project conducted on Metasploitable 2, a deliberately vulnerable Linux-based virtual machine used for practicing penetrati…

    1

  4. SOC-Network-Topology SOC-Network-Topology Public

    1