β
FEATURED PROJECT
πΊοΈ
AD Attack Path Lab
Full Windows domain with documented kill chain from initial foothold to domain compromise using BloodHound path analysis. Includes Kerberoasting, AS-REP Roasting, ACL abuse, and Golden Ticket persistence β with matching detection rules in Elastic SIEM.
// PROJECT STATS
Machines4 VMs
Attack Paths6 Documented
Detections5 Sigma Rules
Duration3 Weeks
StatusComplete
π
SIEM Detection Rules
Custom Sigma detection rules for common attack patterns deployed on Elastic SIEM with automated alerting and dashboards.
π·οΈ
Web App Vuln Research
Systematic OWASP Top 10 exploitation on DVWA & Juice Shop with full documentation and remediation recommendations.
π¬
Malware Analysis Report
Static and dynamic analysis of real malware samples in REMnux sandbox producing IOC report and YARA rules for detection.
π‘οΈ
Network Segmentation Lab
Designed and documented a full VLAN-segmented homelab network using pfSense, including firewall rule logic and monitoring zones.
π
Password Cracking Research
Benchmarked Hashcat attack modes against various hash types and documented optimal wordlist and rule strategies for pentests.
π
Custom Bash Recon Toolkit
A modular bash recon script that chains Nmap, Gobuster, and Nikto output into a structured report for quick engagement setup.