Projects

Offensive Security & Pen Testing
Reconnaissance, exploitation, and post-exploitation

Network Security & Monitoring
IDS/IPS, firewalls, Wireshark, PCAPs, Snort

System Hardening & Endpoint Security
Linux security, user auditing, patching

Malware Analysis & Reverse Engineering
Static/dynamic analysis, behavioral indicators

Threat Intelligence & SIEM
Splunk, log correlation, attack detection



