Security tools, lab environments, and research built from scratch — every project here is something I designed and deployed myself.
A full-stack File Integrity Monitoring system built from scratch. The Python agent hashes every file with SHA-256, detects changes in real time, and reports to a FastAPI backend that streams live alerts to a web dashboard and forwards to Telegram via n8n automation.
Deployed a full ELK Stack (Elasticsearch, Logstash, Kibana) on cloud infrastructure from scratch. Enrolled a Windows VM via Elastic Agent and configured Elastic Defend endpoint security policies — building and testing real detection rules for login monitoring and File Integrity Monitoring.
Deployed a Windows VM on Microsoft Azure and deliberately exposed RDP to the internet to capture real-world brute-force attacks. Independently analysed attacker IP patterns, authentication failure clustering, and timing-based attack behaviour over 24-48 hours. Documented as a SOC-style incident report.
Built a custom log ingestion and correlation pipeline using Python and PostgreSQL to simulate SOC monitoring workflows. Detects brute-force authentication attacks using rule-based correlation — designed to understand how SIEM detection logic works at a fundamental level.