This project provides a configurable web scraping tool focused on extracting security relevant data. Adaptable & Proxy-able to monitor various online sources for indicators of compromise (IoCs), mentions of vulnerabilities, potential data leaks (on public sites like pastebins), or other security-related keywords and patterns.
Ukrainian offensive operators published target lists, with that I conducted a deep dive into Russian military infrastructure, inside Russia, Chechnya, and Belarus. Using a variety of scanning techniques, OSINT.
Kasm Workspaces is more than a virtual desktop platform—it's a strategic enabler for organizations driven by its ability to meet the evolving demands of remote work, cybersecurity, data protection, and cost efficiency. My implementation is tunnelled thru cloudflare zero trust for web access.
A human analyst would need to spend hours, or even days, pivoting through in depth OSINT analysis to build a mental map of the target. I needed a way to do this in seconds.
PowerPwn leverages an offensive security toolset to audit Microsoft365 and Copilot Servers.
Visual Map: Real-Time Security Auditing developed by afsh4ck, is a game-changer. It transforms raw Nmap XML output into an interactive dashboard with host scan risk scoring, cve dash, service distribution, and attack path analysis.
This page serves to give you a guided tour of my current and past research efforts. Both personal and professional, encompassing scripting to embedded devices. Adapting the most modern and capable technologies for cybersecurity roles.
The proliferation of integrated systems, microcontrollers, IOT, and these devices allowing for easier and streamlined Industrial Control Systems has profoundly reshaped the cybersecurity landscape, blurring the lines between the digital and physical worlds. These devices, once niche, are now ubiquitous, powering everything from industrial control systems to everyday consumer electronics. While bringing immense convenience and automation, their widespread adoption has also introduced new attack surfaces and complex security challenges, both at large and within corporate environments.
Pivotal events and devices highlight this shift:
These examples illustrate that cybersecurity is no longer confined to traditional IT networks. It now encompasses the physical devices that control our infrastructure, vehicles, and daily lives. Understanding and securing these integrated systems, microcontrollers, and implants is paramount for comprehensive defense in both national security and corporate cybersecurity strategies. My projects in this domain reflect a hands-on approach to tackling these critical challenges.