Cyber Security with a focus on Development and Automation. Check out my blog, which is hosted on GitHub.
Personal projects, mostly. Feel free to reach out if there's something you think I could help with.
- Service-To-Shell - A project that combines a vulnerable service, nmap probes, and a metasploit module, all written by me.
- Made a webapp vulnerable to command injection
- A custom nmap probe to detect the webapp
- A custom Metasploit Module that automatically exploits the service
- Getting a blog set up (Done) - Set up a blog, deployed automatically with Github Actions
- Training (Networking, Sys Admin, Security)
- Program (Python, getting into Go)
- Offensive Security
- Competition Black Team (ISTS, IRSec)
- Competitive Blue Teaming (CCDC, ISTS, IRSec)
- Competitive Networking (FBLA)
- Programming - Python, PowerShell, Javascript
- Automation - Ansible, Docker, Packer, Vagrant
- Security - Incident response, threat hunting
A ton of Sysmon stuff. Expect additional info on Sysmon later.
- Sysmon-Modular improvements
- Atomic-RedTeam automated data collection
- Sysmon Utilities w/ Python
- Hashicorp-Packer Onion-style images for Windows - Old, a test on using multi-stage builds with Packer as DRY as possible. I think the idea is cool and I might return to it later. The key feature is that after an initial build and bootstrapping process, you can iteratively call
packer
withincrement
and just pass in the variable file, which allows for great template and artifact reuse (Base install -> Update -> 10 different images, only install and update once, then tune for other uses).