A collection of my work and research
Designed a lab to simulate AD attacks like Kerberoasting and Pass-the-Hash.
View ProjectA system to automate security audits for OT and IT environments.
View Projectexploit Discord as a Command-and-Control (C2) channel to remotely control compromised Windows systems
View ProjectA custom sandbox for analyzing malware behavior and network traffic.
View ProjectA script to audit AWS for common security misconfigurations.
View ProjectScripts to automate memory dump analysis using Volatility.
View ProjectA Python tool to parse and analyze logs for suspicious activities.
View ProjectA deliberately vulnerable web app to practice exploiting common flaws.
View ProjectDeployed and configured Suricata for network intrusion detection and prevention.
View ProjectDeveloped a simple symmetric encryption algorithm in Python for educational purposes.
View ProjectA tool to gather publicly available information from various social media platforms.
View ProjectDetailed analysis and solution for a reverse engineering challenge using Ghidra.
View ProjectCreated a controlled phishing campaign to test and improve security awareness.
View ProjectPerformed a security assessment of a popular IoT device, identifying several vulnerabilities.
View ProjectA Bash script to automate initial reconnaissance steps for bug bounty hunting.
View ProjectA tool to aggregate and de-duplicate Indicators of Compromise from multiple public feeds.
View Project