Cyber Security
[all your base are belong to us]
I like to experiment with various teaching platforms to help nail down the foundations and gain new perspectives. I believe you must first understand the system before you can secure it and that's what I've set out to do.
Networking Mini-Projects
Home Network Optimization
Configured a segmented home network using VLANs and firewall rules to manage traffic flow and minimize latency for multiple devices.Network Segmentation Lab
Created a virtualized lab environment to practice subnetting, implement ACLs, and simulate secure traffic isolation between network zones.Secure Remote Access
Deployed a site-to-site VPN using IPsec with multi-factor authentication to enable secure, encrypted access to internal lab resources.Network Troubleshooting
Diagnosed and resolved network issues including IP conflicts, DNS resolution failures, and intermittent packet loss using Wireshark and other diagnostic tools.Wi-Fi Hardening
Improved wireless security by enabling WPA3, disabling SSID broadcast, and managing device access through MAC filtering and DHCP reservations.Router and Switch Configuration
Set up Layer 2 and Layer 3 configurations including VLANs, static routing, and port management on consumer hardware to attempt to simulate real world environments.Firewall Deployment
Configured and tested firewall policies for traffic filtering, port blocking, and basic intrusion prevention in a controlled lab setup.
Cybersecurity Mini-Projects
Penetration testing on simulated networks using Kali Linux, identifying vulnerabilities such as misconfigured servers, outdated software, and weak passwords. Exploited vulnerabilities with tools like Metasploit and Wireshark, demonstrating attack vectors and producing detailed reports.
Password cracking exercises by simulating brute-force and dictionary attacks on password hashes using tools like Hashcat. Developed an understanding of password policies and risks associated with weak credentials.
Reviewed phishing attacks and social engineering scenarios to study how adversaries manipulate users into revealing sensitive information. Learned to identify red flags and create security awareness programs to mitigate such threats.
Applied network traffic analysis techniques to monitor and secure networks. Used tools like Wireshark to capture and analyze packet data, detecting anomalies and threats like Man-in-the-Middle (MitM) attacks.
Conducted system hardening on Linux and Windows systems by disabling unnecessary services, configuring firewalls, implementing secure access controls, and applying security patches.
Performed vulnerability scanning with tools like Nmap and tcpdump to identify open ports, outdated software, and misconfigurations. Generated prioritized remediation reports.
Utilized tools like Flipper Zero to test and interact with RFID, NFC, infrared, and sub-GHz devices in a home lab setting. Gained hands-on experience with signal capture, replay attacks, and wireless protocol analysis for educational and security research purposes.
3d Printed projects
Ender 3, Prusa MK4






Larger projects can take a bit more planning, and often have other disciplines needed to get just want you want from them. They are usually printed in parts before being glued, sanded, and painted.


Masks &MINIS












The challenge in the beginning was finding what I wanted to print, followed by technical obstacles like learning what layer heights, parameters, and infill to use.








modding & Customization
Anything can be modded. Consoles, smart phones, cars, motorcycles, clothing etc. Be it hardware, software, or just aesthetics. Improving things to their best ability with a bit of flair is a constant motivator.
Make it yours



