Hands-on cybersecurity, scripting, and system hardening practice
Simulated brute-force attacks and blocked attackers automatically with Fail2Ban.
Kali Linux Fail2Ban FirewallDetailed scans with custom Nmap scripts, discovering open ports and services.
Nmap Bash EnumerationTracked unauthorized access using WSL-based Kali setup and system logs.
WSL Kali Linux SyslogHosted a fully custom responsive resume page using HTML/CSS on GitHub Pages.
GitHub Pages HTML Responsive DesignCaptured and analyzed network traffic to identify suspicious activity.
Wireshark Network Forensics Packet AnalysisDigital forensic investigation, recovering disk artifacts and browser history.
DFIR Autopsy Disk Analysis