Skip to content
View delsawright's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report delsawright

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. System-Scan-Report_PenTesting_RedTeaming System-Scan-Report_PenTesting_RedTeaming Public

    This report presents the results of an initial vulnerability assessment conducted against a simulated internal system for a fictional company: Hotel Dorsey.

  2. Hotel-Dorsey-Penetration-Test---vsftpd-2.3.4-Exploit Hotel-Dorsey-Penetration-Test---vsftpd-2.3.4-Exploit Public

    This repository documents a simulated penetration test for a fictional client (Hotel Dorsey) to validate a critical vulnerability.

  3. AWS-Virtualization-Project--Simulated AWS-Virtualization-Project--Simulated Public

    AWS Virtualization Project Ubuntu Server Provisioning & Security Analysis

  4. AWS-Cloud-Computing-VPC-Design-Simulated-Project AWS-Cloud-Computing-VPC-Design-Simulated-Project Public

    Hands-on AWS Cloud computing project demonstrating AWS EC2 provisioning, Elastic File System (EFS) integration, S3 storage management, and VPC subnetting with CIDR calculations for a simulated ente…

  5. Cloud-Presentation-Simulated-Migration- Cloud-Presentation-Simulated-Migration- Public

    Simulated cloud migration proposal for a financial consulting firm, analyzing AWS, Azure, and Google Cloud to identify the optimal platform for scalability, security, and cost efficiency.

  6. HIPAA-Privacy-and-Security-Presentation HIPAA-Privacy-and-Security-Presentation Public

    Developed a training presentation on HIPAA Privacy and Security Rules highlighting how cybersecurity principles protect PHI and PII within healthcare systems.