Major projects

Labs, research systems, and technical builds.

$ htb writeup initmitre mapping addedlessons learned saved

Hack The Box / GitHub / Medium

HTB Offensive Security Portfolio

Documenting offensive cybersecurity learning through structured writeups with attack flow diagrams, tools used, MITRE ATT&CK mapping, exploitation steps, observations, findings, lessons learned, SEO keywords, and conclusions.

View HTB page

$ hping3 --syn target$ tshark -r wlan.pcaplabeled csv created

VirtualBox / Wireshark / TShark / Python

SYN Flood Detection and Dataset Engineering Lab

Built a VirtualBox internal network with Windows, Linux, and Raspbian VMs, configured Raspbian as a router/NAT gateway, generated SYN flood traffic with Nmap and hping3, captured traffic, and extracted packet features including IP ID, TTL, TCP flags, IPs, ports, sequence/ack numbers, TCP length, window size, and MSS values for labeled CSV datasets.

$ ghidra wannacryfunctions labeledbehavior documented

Ghidra / Malware Analysis

WannaCry Malware Reverse Engineering

Used Ghidra for static analysis and studied ransomware behavior, functions, and execution logic.

$ ssh pi@labvnc enableddns configured

Raspberry Pi / Networking

Raspberry Pi Network Monitoring Setup

Installed Pi OS, configured SSH, VNC, Ethernet provisioning, Wi-Fi profiles, and DNS settings for network and security experimentation.

$ python arm64_emulator.pyregisters initializedcbz/cbnz evaluated

Python / ARM64 concepts

ARM64 Emulator in Python

Built a simplified ARM64 emulator without emulator libraries, implementing registers, processor state handling, instruction parsing, and CBZ/CBNZ execution logic.

$ parse assembly.asminstruction decodedflow mapped

Parser / Assembly / Execution Flow

ARM64 Assembly Parser

Parsed ARM64 assembly instructions manually and built instruction decoding and execution-flow logic for low-level program understanding.