Archives
- 29 Dec Phase III: Lateral Movement & Privilege Escalation
- 26 Dec Honeypot Chronicles: Analyzing 500k+ SSH Attacks and Hitting the OOM Wall
- 12 Dec Phase II: Enumeration & Foothold
- 07 Dec Multi-Stage Malware Analysis (Pushdo & Gozi)
- 06 Dec Phase I: Deploying the Active Directory Target
- 23 Nov Thesis: Command & Control Frameworks (Grade 5/5)
- 15 Nov Exploit Kit Infection Chain Analysis: Tracing RIG/SunDown EK to C2
- 01 Nov Huntress CTF
- 01 Nov Metasploitable2: Hands-On Security Lab
- 28 Oct Hack The Boo - The Hollowing
- 27 Oct Compromised Airport Infrastructure
- 05 Oct Windows Forensics using Hayabusa
- 26 Sep Holmes CTF 2025
- 21 Sep Initial Network Security Analysis
- 12 Sep SQL-BigData
- 11 Sep Capstone
- 11 Sep Lab16
- 11 Sep Lab15
- 11 Sep Lab15
- 11 Sep Lab14
- 11 Sep Lab13
- 11 Sep Lab12
- 11 Sep Lab10
- 11 Sep Lab09
- 11 Sep Lab08
- 11 Sep Lab07
- 11 Sep Lab06
- 11 Sep Lab04
- 11 Sep Lab03
- 11 Sep Lab02
- 11 Sep Cisco Ethical Hacking
- 10 Sep Welcome to my cybersecurity related portfolio!🚀
- 10 Sep Software-Defined Radio (SDR) with CaribouLite