A production-style blue-team home lab on Proxmox, building toward an end-to-end SOC stack — SIEM, DFIR, detection-as-code, deception, and purple-team operations. Each project ships with a public write-up, repo, and key learnings. Updated as work lands.
Project 0
Lab Foundation
Done
Proxmox VE host with pfSense gateway and DNS forwarder, Active Directory forest (lab.local) on Windows Server 2022, six OUs and eleven seeded users including SPN-tagged service accounts for later Kerberoast practice, and three domain-joined Windows 11 endpoints. Snapshots taken at every meaningful checkpoint for clean rollback.
Shipped 27 Apr 2026
Proxmox VE
pfSense
Active Directory
Windows 11
Project 1
Wazuh SIEM
Done
Wazuh 4.x all-in-one (manager + indexer + dashboard) ingesting three telemetry sources — Sysmon with Olaf Hartong's modular config from DC01 and Win11-User01, File Integrity Monitoring on persistence paths and autorun registry keys, and pfSense syslog (firewall, DHCP, system events). Vulnerability detection module running against NVD + MSRC feeds; documented a real-world feed-coverage gap on Win11 24H2 builds.
Shipped 30 Apr 2026
Wazuh
Sysmon
FIM
Vuln Detection
Project 2
Detection-as-Code
In progress
Atomic Red Team techniques fired against the lab to drive detection engineering: author Sigma rules, convert to Wazuh, version in Git, and measure coverage against MITRE ATT&CK.
Started 30 Apr 2026
Current focus: Sysmon telemetry now flowing from DC01 + Win11-User01 into Wazuh. Next up: install Atomic Red Team and Invoke-AtomicTest, fire ATT&CK techniques against the lab, author Sigma rules to detect each, convert to Wazuh, version-control them in Git.
MITRE ATT&CK
Atomic Red Team
Sigma
Detection Engineering
Project 3
Velociraptor DFIR
Planned
Endpoint hunt and triage at scale — VQL hunts for persistence, lateral movement, and credential access; artefact collection and timeline reconstruction across the AD estate.
Velociraptor
VQL
Hunt & Triage
DFIR
Project 4
MISP Threat Intel
Planned
Self-hosted MISP with curated feeds, IOC enrichment pipeline, and bidirectional integration into the SIEM — surfacing community intel inside Wazuh detections and pushing local findings back out.
MISP
Threat Intelligence
IOCs
STIX / TAXII
Project 4.5
Personal OSINT Monitor
Planned
FastAPI app that scans my own digital footprint — HIBP, Sherlock, search dorks, data-broker enumerators — pushes findings into MISP as private events and drafts UK GDPR Article 17 erasure requests via the Gmail API.
FastAPI
OSINT
Gmail API
GDPR Art. 17
Project 5
TheHive + Cortex SOAR
Planned
Case management and analyser/responder framework wired to MISP and Wazuh. Phishing triage playbook that mirrors my day job — observable extraction, multi-source verdict, automated mailbox actions, IOC publishing.
TheHive
Cortex
SOAR
Playbook Design
Project 6
Purple Team Emulation
Planned
Caldera adversary emulation against the lab AD; BloodHound to surface attack paths; close the loop by hardening the directory and validating that detections fire end-to-end.
Caldera
BloodHound
Purple Team
AD Hardening
Project 7
T-Pot Honeypots
Planned
Multi-protocol honeypot stack on the DMZ VLAN. Attacker telemetry forwarded into Wazuh and enriched with MISP intel — turns scan-noise into local IOCs that improve real detections.
T-Pot
Deception
Honeypots
DMZ
Project 8
Phishing & Malware Sandbox
Planned
Detonation chamber for emails and attachments — Cuckoo or any.run-style analysis with verdict feeding straight into TheHive cases and MISP intel records.
Sandbox
Malware Analysis
Phishing Triage
YARA
Project 9
Cloud SOC on Azure
Planned
Free Azure tenant standing up Defender for Cloud, Sentinel, KQL detections, and Logic App responders — mirroring the production SOC tools I run at work, fully owned end-to-end.
Microsoft Sentinel
Defender for Cloud
KQL
Logic Apps
Project 10
Capstone Incident Simulation
Planned
End-to-end breach scenario across the lab — initial access through to exfiltration, exercised against the SIEM, SOAR, and DFIR stack with an audit-ready incident report as the deliverable.
Incident Response
End-to-End
Reporting
Tabletop