Portfolio

Projects

Security tools, lab environments, and research built from scratch — every project here is something I designed and deployed myself.

Featured Projects
Azure RDP Brute-Force Investigation
LIVE CLOUD ATTACK ANALYSIS

Deployed a Windows VM on Microsoft Azure and deliberately exposed RDP to the internet to capture real-world brute-force attacks. Independently analysed attacker IP patterns, authentication failure clustering, and timing-based attack behaviour over 24-48 hours. Documented as a SOC-style incident report.

Microsoft AzureWindows ServerRDPLog AnalysisIncident Report
  • Real live attacks — not simulated or synthetic traffic
  • IP geolocation analysis of attacker sources
  • Authentication failure pattern analysis and timeline reconstruction
  • Documented in a structured SOC-style investigation report
🛡
Mini SIEM Log Monitoring System
CUSTOM LOG CORRELATION PIPELINE

Built a custom log ingestion and correlation pipeline using Python and PostgreSQL to simulate SOC monitoring workflows. Detects brute-force authentication attacks using rule-based correlation — designed to understand how SIEM detection logic works at a fundamental level.

PythonPostgreSQLSQL CorrelationLog AnalysisBrute-Force Detection
  • Custom log ingestion pipeline — no off-the-shelf SIEM used
  • Rule-based SQL correlation for detecting authentication anomalies
  • Brute-force detection with configurable threshold alerting
Bug Bounty Research
Independent Bug Bounty Researcher — Bugcrowd
Actively hunting vulnerabilities on Bugcrowd programmes. Focus areas: Broken Access Control, IDOR, XSS, Authentication flaws, and Server-Side Misconfiguration. Have identified a server-side misconfiguration in a production application through independent research and practised responsible disclosure.
Server-Side Misconfiguration — Research Write-up
Documented a server-side misconfiguration finding — covering discovery methodology, impact analysis, CVSS scoring, and remediation recommendations. Written as a portfolio demonstration of responsible disclosure and security research methodology. Target intentionally omitted per ethical disclosure practices.