Logo JO's USB
JO's USB

  • Blog
  • Portfolio
  • Tags
  • Archive


  • Font Size
  • Mode
3D Art Showcase II

More 3D art! All of these were made within the last year. I’ve been pretty busy since the winter, so I haven’t been able to do as much 3D art as I’d wish.

3D Art Showcase

I create fully animated 3D art compositions as a hobby, mainly of photorealistic environments or abstract geometric pieces. Here are some of the things I’ve worked on in the past year.

Profile
JO
JO
Software Engineer, 3D Animation Hobbyist.
Toronto, Canada
About
Taxonomies
Cybersecurity 11 3D 3 DevOps 3 Games 2 School Stuff 1 Websites 1
CTF 10 How-To 5 Pentesting 3 SIEM 3 AWS 2 Forensics 2 Threat Hunting 2 Unity 2 Apache 1 Artifactory 1 ALL 21
2024 6 2023 1 2022 3 2021 9 2020 1
Posts
  • CTF Guide: Hunt Me II - Typo Squatters
    CTF Guide: Hunt Me II - Typo Squatters
    May 13, 2024
  • CTF Guide: Hunt Me I - Payment Collectors
    CTF Guide: Hunt Me I - Payment Collectors
    May 10, 2024
  • 3D Art Showcase II
    3D Art Showcase II
    May 3, 2024
  • How To: Embed Streamable.com Videos in Hugo
    How To: Embed Streamable.com Videos in Hugo
    August 19, 2022
  • CTF Guide: Malbuster
    CTF Guide: Malbuster
    June 8, 2024
  • CTF Guide: Benign
    CTF Guide: Benign
    May 25, 2024
  • CTF Guide: Snort Challenge - Live Attacks
    CTF Guide: Snort Challenge - Live Attacks
    May 24, 2024

CTF Guide: Malbuster

CTF Guide: Malbuster
June 8, 20244 min read CybersecurityCTFMalware Analysis

This CTF is part of the Malware Analysis module on THM. In this scenario, you are tasked to analyze unknown malware samples detected by your Security Operations team.

Read More

CTF Guide: Benign

CTF Guide: Benign
May 25, 20244 min read CybersecurityCTFForensicsSIEM

This CTF is part of the SOC Level 1 learning path on TryHackMe. You are tasked to investigate a compromised corporate system using limited Splunk logs.

Read More

CTF Guide: Snort Challenge - Live Attacks

CTF Guide: Snort Challenge - Live Attacks
May 24, 20243 min read CybersecurityCTFIncident Response

This CTF is part of the SOC Level 1 learning path on TryHackMe. It simulates active network breaches on a system, and you are tasked with detecting and remediating the breaches with Snort.

Read More

CTF Guide: Hunt Me II - Typo Squatters

CTF Guide: Hunt Me II - Typo Squatters
May 13, 20248 min read CybersecurityCTFSIEMThreat Hunting

This CTF is the final challenge of the Threat Hunting module on THM. It follows-up right after Hunt Me I, but the questions guide the investigation much less than before.

Read More

CTF Guide: Hunt Me I - Payment Collectors

CTF Guide: Hunt Me I - Payment Collectors
May 10, 20246 min read CybersecurityCTFSIEMThreat Hunting

This CTF is a threat-hunting practice scenario. We’ll have to investigate malicious activity on a computer that’s been the victim of a phishing attack, from initial access all the way to stealing confidential data.

Read More
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Actions
Twitter Facebook

Go back Reload Copy URL
Copyright © 2021-2024 JO. All Rights Reserved.
Powered by Hugo and the HBS theme.