Cybersecurity Projects & Research
|
Conorch – Container Orchestration Technology
Description: Lightweight Linux container orchestration technology developed using native kernel primitives, focusing on isolation, resource control, and secure execution without reliance on external container runtimes.
Technologies: Linux Namespaces, Cgroups v2, Bash, iptables, Virtual Networking
Key Achievements:
- Designed secure container lifecycle management with process, network, and filesystem isolation
- Implemented resource controls for CPU, memory, I/O, and process limits
- Built a custom bridge-based networking model with NAT support
Penetration Testing Lab (CEHv13 Practice)
Description: Custom-built virtual penetration testing lab designed for CEHv13 preparation, simulating enterprise Windows and Linux environments with Active Directory infrastructure.
Technologies: Kali Linux, Windows Server 2019, Windows Server 2022, Windows 10, Lubuntu, Active Directory
Key Achievements:
- Deployed Active Directory and practiced domain-based attack techniques
- Captured NTLMv2-SSP hashes using Responder and successfully cracked credentials
- Created reverse shell payloads and exploited PowerShell scripting using HoaxShell
- Escalated privileges by bypassing UAC and exploiting Sticky Keys mechanisms
IoT-Based Smart Home Intrusion Detection System
Description: Honeypot-driven intrusion detection system for smart home environments designed to detect, redirect, and analyze malicious network activity.
Technologies: Raspberry Pi, Linux Networking, iptables, Virtual Access Point, DHCP
Key Achievements:
- Built a decoy network to attract and analyze attackers performing port scans
- Monitored and redirected malicious traffic to isolated honeypot services
- Generated attack behavior insights for IoT threat modeling
WiFiSnipe
Description: Automated wireless network security testing tool designed to streamline Wi-Fi penetration testing and attack simulation workflows.
Technologies: Aircrack-ng, Wifite, Bash, Kali Linux
Key Achievements:
- Automated scanning of nearby wireless networks
- Captured WPA/WPA2 handshakes for offline password cracking
- Performed targeted deauthentication and jamming attacks
Malware Analysis
Description: Independent research project focused on understanding malware behavior through static and dynamic analysis techniques.
Technologies: Linux, Windows, Ghidra, ProcMon, Static & Dynamic Analysis Tools
Key Achievements:
- Analyzed ransomware, worms, adware, and trojans
- Studied execution flow, persistence mechanisms, and indicators of compromise
- Documented analysis findings and mitigation techniques
Socket Programming
Description: Low-level networking project exploring client-server communication models using socket programming concepts.
Technologies: C, Linux Sockets, TCP/IP, Client–Server Architecture
Key Achievements:
- Implemented reliable client-server communication over TCP
- Studied connection handling, data transmission, and error management
- Gained practical understanding of network protocol behavior
Project Methodology
Approach: Projects are executed using a research-driven, hands-on methodology combining real-world attack simulation, defensive validation, and system-level analysis. Work spans hardware-enforced security, wireless and IoT threat modeling, Linux OS internals, malware behavior analysis, and enterprise penetration testing aligned with practical VAPT workflows.
Execution: Each project emphasizes controlled lab environments, realistic threat scenarios, and iterative testing. This includes Active Directory exploitation, wireless attack simulations, container isolation testing, honeypot deployment, reverse engineering, and low-level network programming.
Documentation: All projects are supported by structured technical documentation, architecture notes, attack paths, proof-of-concept results, and remediation insights, with sensitive or proprietary details intentionally abstracted where required.
Collaboration: Open to technical discussions on project architecture, attack methodologies, and security design decisions. Contact me for further details.