Cybersecurity Projects & Research

|

Conorch – Container Orchestration Technology

Description: Lightweight Linux container orchestration technology developed using native kernel primitives, focusing on isolation, resource control, and secure execution without reliance on external container runtimes.

Technologies: Linux Namespaces, Cgroups v2, Bash, iptables, Virtual Networking

Key Achievements:

  • Designed secure container lifecycle management with process, network, and filesystem isolation
  • Implemented resource controls for CPU, memory, I/O, and process limits
  • Built a custom bridge-based networking model with NAT support

Penetration Testing Lab (CEHv13 Practice)

Description: Custom-built virtual penetration testing lab designed for CEHv13 preparation, simulating enterprise Windows and Linux environments with Active Directory infrastructure.

Technologies: Kali Linux, Windows Server 2019, Windows Server 2022, Windows 10, Lubuntu, Active Directory

Key Achievements:

  • Deployed Active Directory and practiced domain-based attack techniques
  • Captured NTLMv2-SSP hashes using Responder and successfully cracked credentials
  • Created reverse shell payloads and exploited PowerShell scripting using HoaxShell
  • Escalated privileges by bypassing UAC and exploiting Sticky Keys mechanisms

IoT-Based Smart Home Intrusion Detection System

Description: Honeypot-driven intrusion detection system for smart home environments designed to detect, redirect, and analyze malicious network activity.

Technologies: Raspberry Pi, Linux Networking, iptables, Virtual Access Point, DHCP

Key Achievements:

  • Built a decoy network to attract and analyze attackers performing port scans
  • Monitored and redirected malicious traffic to isolated honeypot services
  • Generated attack behavior insights for IoT threat modeling

WiFiSnipe

Description: Automated wireless network security testing tool designed to streamline Wi-Fi penetration testing and attack simulation workflows.

Technologies: Aircrack-ng, Wifite, Bash, Kali Linux

Key Achievements:

  • Automated scanning of nearby wireless networks
  • Captured WPA/WPA2 handshakes for offline password cracking
  • Performed targeted deauthentication and jamming attacks

Malware Analysis

Description: Independent research project focused on understanding malware behavior through static and dynamic analysis techniques.

Technologies: Linux, Windows, Ghidra, ProcMon, Static & Dynamic Analysis Tools

Key Achievements:

  • Analyzed ransomware, worms, adware, and trojans
  • Studied execution flow, persistence mechanisms, and indicators of compromise
  • Documented analysis findings and mitigation techniques

Socket Programming

Description: Low-level networking project exploring client-server communication models using socket programming concepts.

Technologies: C, Linux Sockets, TCP/IP, Client–Server Architecture

Key Achievements:

  • Implemented reliable client-server communication over TCP
  • Studied connection handling, data transmission, and error management
  • Gained practical understanding of network protocol behavior

Project Methodology

Approach: Projects are executed using a research-driven, hands-on methodology combining real-world attack simulation, defensive validation, and system-level analysis. Work spans hardware-enforced security, wireless and IoT threat modeling, Linux OS internals, malware behavior analysis, and enterprise penetration testing aligned with practical VAPT workflows.

Execution: Each project emphasizes controlled lab environments, realistic threat scenarios, and iterative testing. This includes Active Directory exploitation, wireless attack simulations, container isolation testing, honeypot deployment, reverse engineering, and low-level network programming.

Documentation: All projects are supported by structured technical documentation, architecture notes, attack paths, proof-of-concept results, and remediation insights, with sensitive or proprietary details intentionally abstracted where required.

Collaboration: Open to technical discussions on project architecture, attack methodologies, and security design decisions. Contact me for further details.