This repository is all about a Security Operations Center (SOC) lab built to simulate real-world security operations. It runs on a Proxmox VE infrastructure and integrates multiple tools, including Wazuh, Security Onion, Pi-hole, n8n, Tenable Nessus, Kali Linux, and more. The lab is designed for hands-on practice in monitoring, detection, incident response, and automation.
All configurations, architectures, and findings are documented in Obsidian and synced with this repository for analysis and continuous learning.
| Component | Purpose |
|---|---|
| Proxmox VE | Hypervisor platform for hosting and managing all virtual machines in the lab environment. |
| Kali Linux | Penetration testing and offensive security distribution used for ethical hacking, vulnerability testing, and exploit simulation. |
| Docker | Container platform for running lightweight, isolated services and applications. |
| Portainer | Web-based Docker management tool for deploying and managing containers easily. |
| Ubuntu Server | Linux server used for hosting docker. |
| Active Directory | Directory service used to simulate domain controller functionality, centralized identity management, and group policy. |
| Windows 11 | Simulates a user/target workstation for endpoint testing, phishing and social engineering exercises, Active Directory client behavior, and post-exploitation scenarios. |
| n8n | Automation and orchestration platform used to build workflows and integrate different tools within the lab. |
| Wazuh | SIEM and endpoint security platform for log collection, intrusion detection, and security monitoring. |
| Security Onion | Network security monitoring and intrusion detection platform for packet analysis and threat hunting. |
| Tenable Nessus | Vulnerability scanner for identifying and assessing security weaknesses in hosts and networks. |
| Pi-hole | Network-wide DNS sinkhole used for ad blocking, DNS filtering, and traffic visibility. |
| VirusTotal | Threat intelligence integration for analyzing suspicious files and URLs using multiple antivirus engines. |
| Metasploitable 2 | Intentionally vulnerable Linux VM for penetration testing practice and exploit simulation. |
- Proxmox VE: https://www.proxmox.com/en/
- Kali Linux: https://www.kali.org/
- Windows Server 2022: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022
- Wazuh: https://wazuh.com/
- Security Onion: https://securityonionsolutions.com/
- Tenable Nessus: https://www.tenable.com/downloads/nessus?loginAttempted=true
- Pi-hole: https://pi-hole.net/
- Metasploitable 2: https://docs.rapid7.com/metasploit/metasploitable-2/


