Portfolio

PROJECT
CASE STUDIES

Real-world security research, lab projects, and CTF writeups. Each case study documents the methodology, tools used, findings, and outcomes.

MALWARE ANALYSISREVERSE ENG

WANNACRY ANALYSIS

Static and dynamic analysis of WannaCry ransomware in a sandboxed lab. Documented the EternalBlue propagation chain, SMBv1 exploitation, AES-RSA encryption routine, and C2 communication patterns.

↑ Full kill chain documented CASE STUDY →
NETWORK SECURITYIDS

NETWORK MONITORING LAB

Home lab environment with live packet capture. Built custom Snort IDS rules to detect port scans, brute-force, and anomalous payloads with full alert correlation and Wireshark analysis.

↑ 12 custom IDS rules CASE STUDY →
LINUX HARDENINGAUDIT

LYNIS SECURITY AUDIT

CIS-benchmark-aligned security audit of a Linux server using Lynis. Identified and remediated SSH misconfigs, kernel parameters, and unnecessary service exposure with before/after scoring.

↑ Hardening score +38 pts CASE STUDY →
+MORE COMING SOON
Add your next project here
+CTF WRITEUP
Document your next CTF challenge
+BUG BOUNTY REPORT
Add a responsible disclosure writeup