Built and secured an Ubuntu server from the ground up, applying best practices in system hardening, user access control, and performance optimization. Implemented firewall rules, SSH hardening, and Fail2Ban for brute-force protection. Strengthened practical expertise in Linux administration and real-world cybersecurity defenses.
Simulated SSH brute-force attacks using Hydra and msfconsole on an Ubuntu server to test password strength, logging, and intrusion detection. Implemented countermeasures and documented results to improve server security. This project demonstrates practical understanding of attack vectors and defensive strategies.
Collaborated with a web developer to perform a full-scale penetration test on a live web application. Conducted reconnaissance, vulnerability scanning, directory enumeration, and manual exploitation using industry-standard tools. Identified open directories exposing the database, clickjacking vulnerabilities, and other potential threats. Documented all findings and worked with the developer on remediation.
An intelligent vulnerability scanning tool that leverages machine learning to identify potential security weaknesses in web applications and network infrastructure. The scanner analyzes patterns and anomalies to detect vulnerabilities that might be missed by traditional scanning tools, providing enhanced security assessment capabilities.
An AI-powered terminal assistant for Kali Linux that helps automate penetration testing tasks, provide intelligent recommendations, and streamline security workflows. This project combines cybersecurity expertise with AI to create an interactive assistant that can understand natural language commands and execute appropriate security tools.