Welcome to my professional portfolio. This repository documents hands-on labs and independent research focused on penetration testing, digital forensics, and network security.
A controlled penetration test demonstrating the exploitation of a known backdoor in a legacy FTP service to gain root-level access.
- Tools: Metasploit, Nmap, Kali Linux, VirtualBox.
- Key Skills: Vulnerability Research (CVE-2011-2523), Penetration Testing, Remediation Strategy.
- View Project Details
An in-depth forensic analysis of the Kenneth Lay email corpus using Autopsy to identify artifacts of executive misconduct and internal corporate sentiment.
- Tools: Autopsy 4.22.1
- Key Skills: Digital Forensics, Keyword Indexing, Metadata Analysis, Timeline Reconstruction.
- View Project Details
| Category | Tools & Technologies |
|---|---|
| Security Frameworks | NIST CSF, Vulnerability Management |
| Offensive Security | Kali Linux, Metasploit, Nmap, Zenmap |
| Digital Forensics | Autopsy, FTK Imager |
| Networking | TCP/IP, Wireshark, Cisco Networking (I, II, III) |
| Systems & Data | Linux Administration, Python (Security Scripting), SQL |