Platform for SOC Builders

Build and defend like real Security Engineers — from beginner SOC labs to advanced blue-team projects.

AWS Cloud Security Posture Assessment Home-Lab Using Steampipe + Powerpipe

AWS Cloud Security Posture Assessment Home-Lab Using Steampipe + Powerpipe

This project will help you set up a local, agentless AWS security lab using SQL queries and interactive dashboards. You'll be able to query your AWS infrastructure using SQL and visualize security insights through a web-based dashboard—all running on your own machine.

Beginner
PRO
Hands-on with OSquery

Hands-on with OSquery

You’ll learn Osquery fundamentals and understand how security teams use Osquery for endpoint visibility, investigation, and threat hunting.

Beginner
PRO
Wireshark Protocol Analysis

Wireshark Protocol Analysis

Learn how network protocols actually behave on the wire by analyzing ARP, ICMP, TCP, UDP, DNS, HTTP, and TLS traffic using Wireshark—building the protocol understanding required before security investigations.

Beginner
FREE
Introduction to n8n for Cybersecurity

Introduction to n8n for Cybersecurity

Learn how SOC and IT teams automate security workflows in real-world environments by understanding n8n fundamentals, triggers, webhooks, data handling, decision logic, alert enrichment, and notification workflows.

Beginner
FREE
Introduction to Log Analysis

Introduction to Log Analysis

Learn how SOC analysts analyze logs in real-world environments by understanding log types, structures, searching techniques, pattern detection, and hands-on analysis using Splunk, Wazuh, and ELK Stack.

Beginner
FREE
Wireshark Fundamentals

Wireshark Fundamentals

Master the essential packet analysis skills required for SOC Analysts, Network Engineers, and Security Professionals using real-world traffic captures and hands-on labs.

Beginner
FREE
Hands-on with Threat Intelligence

Hands-on with Threat Intelligence

Learn how Threat Intelligence (TI) is used in real SOC environments to enrich alerts, identify attacker infrastructure, map threats to MITRE ATT&CK, and improve detection and response using open-source and community-driven intelligence platforms.

Beginner
FREE
Hands-on with SOAR

Hands-on with SOAR

Learn how SOAR platforms automate SOC operations by orchestrating tools, enriching alerts, and executing response actions—through hands-on walkthroughs of n8n, Shuffle, and Tines.

Beginner
FREE
Hands-on with SIEM

Hands-on with SIEM

Learn how SIEM platforms work in real SOC environments by understanding log ingestion, normalization, searching, correlation, and alerting—followed by hands-on walkthroughs of Splunk, Wazuh SIEM, and ELK Stack.

Beginner
FREE
Hands-on with EDR

Hands-on with EDR

Learn how EDR works in real SOC environments by understanding endpoint telemetry, detection logic, and response workflows—followed by hands-on walkthroughs of popular open-source EDR tools.

Beginner
FREE
SOC L1 Triage and Reporting

SOC L1 Triage and Reporting

Develop real-world SOC Analyst Level-1 skills by learning how to triage security alerts, validate threats using context, collect evidence, classify severity, and write professional incident reports used in enterprise SOC environments.

Beginner
FREE
Introduction to SOC (Security Operations Center)

Introduction to SOC (Security Operations Center)

Understand how a real-world Security Operations Center (SOC) operates by learning its purpose, people, tools, processes, data flow, alerts, and business impact through structured, concept-driven tasks.

Beginner
FREE
Introduction to Cybersecurity

Introduction to Cybersecurity

Build a strong foundation in cybersecurity by understanding threats, attacks, defenses, identity protection, and cryptography through practical, beginner-friendly exercises.

Beginner
FREE
Networking Fundamentals

Networking Fundamentals

Build strong networking foundations by understanding how data moves across networks, how devices communicate, and how enterprises design, monitor, and secure networks.

Beginner
FREE
Windows AD Fundamentals

Windows AD Fundamentals

Master the core concepts of Windows Active Directory (AD) by building, managing, and analyzing a real AD environment the way it’s used in enterprise networks.

Beginner
FREE
Windows Fundamentals

Windows Fundamentals

Master the core Windows skills required for SOC Analysts, Security Engineers, IT Administrators, and Cloud Professionals through fully hands-on, task-based labs.

Beginner
FREE
AWS GuardDuty logs Ingestion in Splunk

AWS GuardDuty logs Ingestion in Splunk

Build a near real-time event-driven pipeline to stream GuardDuty security findings through EventBridge, SNS, and SQS into Splunk for immediate threat detection and incident response.

Beginner
PRO
Network Traffic Investigation with Suricata and ELK

Network Traffic Investigation with Suricata and ELK

Investigate network traffic on a target Ubuntu machine using Suricata (IDS) and ELK SIEM with Fleet (Elastic Agent), visualize suspicious network traffic patterns, and create alerts for abnormal or potentially malicious activities such as intrusion attempts, DDoS attacks, or malware communication.

Beginner
PRO
Investigating File Integrity using Auditd

Investigating File Integrity using Auditd

Investigate file integrity and detect unauthorized changes on a target Ubuntu machine using Auditd and ELK SIEM with Fleet (Elastic Agent). This guide will walk you through setting up Auditd to monitor file integrity, sending logs to Elasticsearch via Fleet, visualizing file changes in Kibana, and setting up alerts for suspicious activities like unauthorized file modifications.

Beginner
PRO
Detecting Suspicious activities using Sysmon For Linux

Detecting Suspicious activities using Sysmon For Linux

Detect and investigate suspicious system changes (such as potential rootkits or malware) on a target Ubuntu machine using ELK SIEM with Fleet (Elastic Agent), Sysmon for Linux, and the Sysmon for Linux Connector, visualize these changes in real-time, and create alerts for abnormal system behaviors.

Beginner
PRO
Monitoring User Account Activity Using Splunk

Monitoring User Account Activity Using Splunk

Use Sysmon for Linux to monitor and detect unauthorized user account activities, such as privilege escalations, account creations, deletions, or suspicious commands. Leverage Sysmon’s detailed logging capabilities to track and analyze user activity efficiently.

Beginner
PRO
Detecting Abnormal Network Traffic Using Splunk

Detecting Abnormal Network Traffic Using Splunk

Set up a network monitoring system to detect abnormal traffic patterns, including data exfiltration and command-and-control (C2) communication, by leveraging Suricata with Emerging Threats (ET) rules and analyzing logs using Splunk.

Beginner
PRO
File Integrity Monitoring for Sensitive Directories

File Integrity Monitoring for Sensitive Directories

Monitor and detect unauthorized modifications, deletions, or attribute changes in sensitive directories, such as /etc/, using Auditd for real-time monitoring and Splunk for centralized log analysis.

Beginner
PRO
Linux Fundamentals

Linux Fundamentals

Master the core Linux skills required for SOC Analysts, Security Engineers, and Cloud Professionals through fully hands-on labs.

Beginner
FREE
AWS CloudTrail Logs Ingestion in Splunk

AWS CloudTrail Logs Ingestion in Splunk

Build a reliable CloudTrail ingestion pipeline for Splunk with AWS services like S3, SNS and SQS. Understand each component and how Splunk processes logs end-to-end.

Intermediate
PRO
Pfsense Firewall Logs Ingestion In Wazuh

Pfsense Firewall Logs Ingestion In Wazuh

Build a centralized security monitoring environment by sending pfSense firewall logs to Wazuh for real-time threat detection and analysis. In this hands-on project, you will configure pfSense to forward logs to a Wazuh Manager, where they will be parsed, indexed, and visualized through the Wazuh Dashboard.

Beginner
FREE
Check Point Firewall Logs Ingestion in Graylog

Check Point Firewall Logs Ingestion in Graylog

Build a complete centralized security log management system by ingesting Check Point Firewall logs into Graylog using Syslog and Docker. Learn how to collect, store, parse, and analyze enterprise-grade firewall telemetry inside Graylog for threat detection and monitoring.

Beginner
FREE
Suspicious file change detection and Respond On Ubuntu Using Wazuh

Suspicious file change detection and Respond On Ubuntu Using Wazuh

Detect unauthorized or suspicious file modifications in critical directories using Wazuh’s FIM (File Integrity Monitoring) module and automatically isolate or remediate affected endpoints through Active Response.

Beginner
PRO
Splunk SOAR Home-Lab

Splunk SOAR Home-Lab

Build a SOAR-enabled SIEM lab with Splunk Phantom, Splunk Enterprise, Wazuh sensors/agents, DMZ hosts, integrations (VirusTotal, Slack, ServiceNow, Outlook) and AWS GuardDuty alerting into Phantom.

Intermediate
PRO
Open Source SOAR Home-Lab using Shuffle

Open Source SOAR Home-Lab using Shuffle

Build an Open-Source SOAR Lab integrating Shuffle with Wazuh, Suricata IDS, Splunk Enterprise, and AWS GuardDuty, including integrations with VirusTotal, Slack, ServiceNow, Outlook, and OTX for automated detection, enrichment, and response.

Intermediate
PRO
Splunk SIEM Home-Lab

Splunk SIEM Home-Lab

Build and Configure a Complete Threat-Detection Environment using Splunk, Suricata IDS, and Attacker Simulations

Intermediate
PRO
Hands-on with Qualys VM

Hands-on with Qualys VM

A Practical Guide to Vulnerability Management, Scanning, and Remediation with Qualys VM

Beginner
FREE
AI Agent for Firewall Rulebase Audit

AI Agent for Firewall Rulebase Audit

Build an automated workflow to audit Palo Alto firewall rules, enrich them with real-time usage data, and generate insightful security reports using n8n and AI.

Advanced
PRO
Wazuh + n8n +  Anyrun: Automated Malware Analysis

Wazuh + n8n + Anyrun: Automated Malware Analysis

Automate malware analysis by sending Wazuh-detected suspicious files into ANY.RUN, retrieving detailed reports and IOCs, and integrating results back into your SOC workflow.

Intermediate
PRO
Wazuh + n8n:  Automated File Hash Enrichment

Wazuh + n8n: Automated File Hash Enrichment

Enrich Wazuh file-integrity alerts with VirusTotal file-hash lookups, generate a human-friendly report, and escalate suspicious files to ServiceNow + Slack.

Intermediate
PRO
Wazuh + n8n: Automated IP Encrichment

Wazuh + n8n: Automated IP Encrichment

Enrich Wazuh alerts with IP reputation (VirusTotal + AlienVault) and route suspicious IPs to ServiceNow / Slack / Email via n8n.

Intermediate
PRO
DNS Log Analysis using Splunk

DNS Log Analysis using Splunk

Analyse DNS query logs in Splunk to detect anomalies, query patterns, and suspicious activity.

Intermediate
FREE
HTTP Log Analysis using Splunk

HTTP Log Analysis using Splunk

A Hands-On Lab to Detect Client Errors, Suspicious User Agents, and Malicious URIs Using Splunk SIEM

Intermediate
FREE
SSH Log Analysis using Splunk

SSH Log Analysis using Splunk

A Hands-On Lab to Detect Brute Force Attacks, Failed Logins, and Suspicious SSH Activity Using Splunk SIEM

Intermediate
FREE
Installing Wazuh SIEM

Installing Wazuh SIEM

Deploy and configure Wazuh SIEM on Ubuntu to monitor, detect, and respond to security events in real-time.

Beginner
FREE
Installing Splunk Enterprise

Installing Splunk Enterprise

Set up Splunk Enterprise on Ubuntu to start collecting, indexing, and analyzing machine data in minutes

Beginner
FREE
Installing Suricata IDS

Installing Suricata IDS

Build, Configure, and Master Intrusion Detection with Suricata in Your Own Lab

Beginner
FREE
Projects | Haxcamp