A production-style blue-team home lab on Proxmox, building toward an end-to-end SOC stack — SIEM, DFIR, detection-as-code, deception, and purple-team operations. Each project ships with a public write-up, repo, and key learnings. Updated as work lands.
Project 0
Lab Foundation
Done
Proxmox VE host with pfSense gateway and DNS forwarder, Active Directory forest (lab.local) on Windows Server 2022, six OUs and eleven seeded users including SPN-tagged service accounts for later Kerberoast practice, and three domain-joined Windows 11 endpoints. Snapshots taken at every meaningful checkpoint for clean rollback.
Proxmox VE
pfSense
Active Directory
Windows 11
Project 1
Wazuh SIEM
Planned
All-in-one Wazuh deployment ingesting Sysmon (Olaf Hartong config), File Integrity Monitoring, and vulnerability detection across Windows and Linux endpoints. Forms the telemetry spine for every project that follows.
Wazuh
Sysmon
FIM
Vuln Detection
Project 2
Detection-as-Code
Planned
Atomic Red Team techniques fired against the lab to drive detection engineering: author Sigma rules, convert to Wazuh, version in Git, and measure coverage against MITRE ATT&CK.
MITRE ATT&CK
Atomic Red Team
Sigma
Detection Engineering
Project 3
Velociraptor DFIR
Planned
Endpoint hunt and triage at scale — VQL hunts for persistence, lateral movement, and credential access; artefact collection and timeline reconstruction across the AD estate.
Velociraptor
VQL
Hunt & Triage
DFIR
Project 4
MISP Threat Intel
Planned
Self-hosted MISP with curated feeds, IOC enrichment pipeline, and bidirectional integration into the SIEM — surfacing community intel inside Wazuh detections and pushing local findings back out.
MISP
Threat Intelligence
IOCs
STIX / TAXII
Project 4.5
Personal OSINT Monitor
Planned
FastAPI app that scans my own digital footprint — HIBP, Sherlock, search dorks, data-broker enumerators — pushes findings into MISP as private events and drafts UK GDPR Article 17 erasure requests via the Gmail API.
FastAPI
OSINT
Gmail API
GDPR Art. 17
Project 5
TheHive + Cortex SOAR
Planned
Case management and analyser/responder framework wired to MISP and Wazuh. Phishing triage playbook that mirrors my day job — observable extraction, multi-source verdict, automated mailbox actions, IOC publishing.
TheHive
Cortex
SOAR
Playbook Design
Project 6
Purple Team Emulation
Planned
Caldera adversary emulation against the lab AD; BloodHound to surface attack paths; close the loop by hardening the directory and validating that detections fire end-to-end.
Caldera
BloodHound
Purple Team
AD Hardening
Project 7
T-Pot Honeypots
Planned
Multi-protocol honeypot stack on the DMZ VLAN. Attacker telemetry forwarded into Wazuh and enriched with MISP intel — turns scan-noise into local IOCs that improve real detections.
T-Pot
Deception
Honeypots
DMZ
Project 8
Phishing & Malware Sandbox
Planned
Detonation chamber for emails and attachments — Cuckoo or any.run-style analysis with verdict feeding straight into TheHive cases and MISP intel records.
Sandbox
Malware Analysis
Phishing Triage
YARA
Project 9
Cloud SOC on Azure
Planned
Free Azure tenant standing up Defender for Cloud, Sentinel, KQL detections, and Logic App responders — mirroring the production SOC tools I run at work, fully owned end-to-end.
Microsoft Sentinel
Defender for Cloud
KQL
Logic Apps
Project 10
Capstone Incident Simulation
Planned
End-to-end breach scenario across the lab — initial access through to exfiltration, exercised against the SIEM, SOAR, and DFIR stack with an audit-ready incident report as the deliverable.
Incident Response
End-to-End
Reporting
Tabletop