Number of Projects:
21
1 / Cloud Security Exploitation
An exploration of cloud infrastructure security vulnerabilities and misconfigurations. This project examines security risks specific to cloud environments, including exposed storage buckets, overly permissive IAM policies, insecure API configurations, and cloud-native attack techniques. It demonstrates enumeration methods for cloud assets, exploitation of common misconfigurations, and best practices for securing cloud deployments across major platforms like AWS, Azure, and Google Cloud.
2 / Simple Payload Exploitation
A technical demonstration of payload creation and exploitation techniques using Python. This project explores how malicious payloads are crafted, delivered, and executed on target systems. It covers payload encoding, obfuscation methods, delivery mechanisms, and exploitation frameworks. The project illustrates the mechanics behind exploit development and how attackers weaponize vulnerabilities to achieve code execution and system compromise.
3 / Recon Automation Using Beautiful Soup
A web scraping project utilizing Python's BeautifulSoup library for automated data extraction. This project showcases how to programmatically parse HTML and XML documents to collect information from websites. It demonstrates practical applications in reconnaissance, OSINT gathering, and automated intelligence collection for security assessments.
4 / Active Information Gathering
An exploration of active reconnaissance techniques used to enumerate live targets and network infrastructure. This project demonstrates hands-on information gathering methods including port scanning, service enumeration, banner grabbing, and network mapping. Unlike passive reconnaissance, this approach involves direct interaction with target systems to identify running services, open ports, and potential attack surfaces.
– Let's Be Bad Guys
– Vulpy
5 / Static Code Analysis
An examination of source code security through static analysis techniques. This project demonstrates how to identify vulnerabilities, coding flaws, and security weaknesses by analyzing code without executing it. It covers automated scanning tools, manual code review methodologies, and common vulnerability patterns found in application source code.
6 / Open-Source Intelligence
A comprehensive phishing campaign simulation demonstrating social engineering attack vectors and reconnaissance techniques. This project explores the complete phishing lifecycle, starting with OSINT (Open Source Intelligence) gathering to collect target information from publicly available sources. It includes automated reconnaissance scripts for efficient data collection and profiling, culminating in a whaling attack—a sophisticated spear-phishing operation targeting high-value individuals like executives. The project showcases realistic landing page creation, credential harvesting techniques, and the methodology attackers use to craft convincing, targeted phishing campaigns.
7 / Client-Side Exploitation
An investigation into attack vectors that target end-user systems through client-side vulnerabilities. This project explores exploitation techniques that leverage browser weaknesses, malicious documents, drive-by downloads, and social engineering to compromise user workstations. It demonstrates how attackers shift from server-side attacks to exploiting the human element and client applications, including payload delivery methods and evasion techniques to bypass security controls.
8 / Web Application Exploitation
A practical examination of web application vulnerabilities and exploitation techniques. This project demonstrates how to identify and exploit common security flaws in web applications, including injection attacks, broken authentication, insecure direct object references, and cross-site scripting. It covers manual testing methodologies, automated scanning tools, and proof-of-concept exploits that illustrate the real-world impact of web application weaknesses and the importance of secure development practices.
9 / Investigating Web Application Attacks
An analysis of common web application attack vectors and exploitation techniques. This project examines how attackers target web-based systems through vulnerabilities like SQL injection, cross-site scripting (XSS), and authentication bypass. It demonstrates detection methods, investigative procedures, and response strategies for identifying and mitigating web application threats.
10 / Investigating Network Attacks
A comprehensive investigation into network-layer security incidents and attack methodologies. This project explores how malicious actors conduct reconnaissance, exploit network protocols, and move laterally across systems. It covers packet analysis, intrusion detection patterns, and forensic techniques for uncovering network-based threats.
11 / Network Vulnerability Discovery
A systematic approach to identifying security weaknesses in network infrastructure. This project showcases vulnerability scanning techniques, network mapping, and security assessment methodologies used to discover exploitable flaws before attackers do. It includes remediation recommendations and risk prioritization strategies.
13 / Malware Investigation
A deep dive into malware analysis and reverse engineering techniques. This project documents the process of examining malicious software to understand its behavior, capabilities, and indicators of compromise. It includes static and dynamic analysis methods, threat attribution, and malware family identification.
14 / Investigating Endpoint Vulnerability
An examination of endpoint security weaknesses and compromise indicators on individual systems. This project demonstrates how to assess workstations and servers for vulnerabilities, misconfigurations, and signs of exploitation. It covers host-based analysis, privilege escalation vectors, and endpoint hardening practices.
15 / Cloud Security Monitoring
An exploration of security monitoring strategies for cloud environments. This project addresses the unique challenges of detecting threats in cloud infrastructure, including misconfigurations, unauthorized access, and data exfiltration. It demonstrates logging, alerting, and incident response in platforms like AWS, Azure, or GCP.
16 / User Security Monitoring
A study of user behavior analytics and insider threat detection. This project focuses on monitoring user activities to identify anomalous behavior, credential abuse, and potential security violations. It covers baseline establishment, anomaly detection techniques, and privacy-conscious monitoring approaches.
17 / Raccoon Stealer
An analysis of the Raccoon Stealer malware family. This project examines this information-stealing trojan's infection chain, credential harvesting capabilities, and evasion techniques. It includes threat intelligence, detection signatures, and defensive countermeasures against this prevalent data theft malware.
18 / Deconstructing a Cybersecurity Event
A methodical breakdown of a complete security incident from initial compromise to resolution. This project walks through the entire lifecycle of a cybersecurity event, examining each phase including detection, analysis, containment, eradication, and recovery. It demonstrates how to piece together disparate evidence, establish attack timelines, and document findings for comprehensive incident reporting.
19 / SAP
A security assessment of SAP enterprise systems and their unique vulnerabilities. This project explores the specific risks associated with SAP environments, including authorization flaws, transport management weaknesses, and custom code vulnerabilities. It covers SAP-specific attack techniques, security configuration best practices, and methods for protecting critical business processes running on SAP platforms.
20 / Device Forensics
A hands-on investigation into digital forensics techniques for various computing devices. This project demonstrates evidence acquisition, preservation, and analysis procedures for extracting and examining data from computers, mobile devices, and storage media. It includes file system analysis, artifact recovery, timeline reconstruction, and maintaining chain of custody for forensic integrity.
