THIS PAGE IS STILL UNDER DEVELOPMENT, WHAT YOU CURRENTLY SEE ISNT THE FINAL VERSION

Projects

I have many projects i am currently working on, some of these include cyber security projects, and some are just simple Software Development Projects.
Below, you will find the languages i am currently using/learning:

  • HTML
  • CSS
  • JavaScript
  • C++
  • Python

GitHub Projects

Below, if you click on the image, it will link you to my GitHub account, here you will find everything I publish software wise.
github logo



Below Here, you will find a list of all unsorted projects that have not been uploaded to my github

DISCLAIMER: ALL OF THESE PROJECTS WERE COMPLETED IN A SAFE AND ISOLATED ENVIRONMENT, NECESSARY STEPS WERE TAKEN TO ENSURE THAT THESE PROJECTS HAD NO EFFECT WHATSOEVER TO OUTSIDE OF THE CLOSED SYSTEM

Malware Analysis 🦠

I have spent hours analysing and monitoring Malware in isolated environments to help me understand how Malicious Actors can use these Malwares to disrupt, steal and destroy data.

Using enclosed and isolated virtual machines, i have been able to study malware both offensively and defensively, giving me an insight into how these actors can evade detection and how Defense experts can detect these actors.

I have used both offensive and defensive tools to help me and i am constantly learning new features of these tools daily.

-Metasploit Framework

-Kali Linux

-Interactive Disassembler(IDA)

The FatRat (Open Source Software that was used for educational purposes only)


I have also started to learn memory coding myself, to help me gain a further understanding into malware and how it is constructed and how it utilizes memory

CVE's and Other Exploits

🧨

Like Malware Analysis, i have also mainly been learning the exploits that can be used against machines that are vulnerable.
Learning and Using these exploits in a closed network, i have managed to understand how Malicious actors can pivot through networks and bypass UAC (User Access Control) to infect devices and compromise a system and network. Here are a few exploits i have been studying and deploying to my own systems



UAC bypass techniques

MSRPC execution exploits

Utilisation of Hardware for Pen-testing 💻

Below, you will find a list of hardware devices i have used to upskill myself with brief descriptions
-Alfa AWUS036AC: This Network Adapter has been used to conduct pentesting on my own network. The pentesting had included Sniffing and cracking WPA2 Encryption.
-Hak5â„¢ USB Rubber Ducky: This tiny but powerful USB adapter has helped me understand how curiosity can cause mass disruption. This device conducts automatic keystroke injection attacks which allows the attacker to do anything they want.
-Raspberry Pi 4: This is probably the best part of the kit i own as it is extremely versatile. Some projects i have done include: Custom DNS Server that blocks Ads at the DNS level; NAS Server which makes file transferring more convenient; Honeypot to lure in and trap malicious actors.

Overall, this is the kit i have used to get a good understanding of how networks can be protected but also how they can be exploited by using physcial attacks.