Home Lab Infrastructure

Dell PowerEdge pfSense Proxmox Docker ELK Wazuh

Enterprise-grade home lab built on Dell PowerEdge servers running Proxmox virtualization. Segmented network with pfSense firewalls, VLANs for isolated attack/defense zones, and a full ELK + Wazuh monitoring stack. Serves as the foundation for all research, testing, and training.

Infrastructure includes multiple VMs for red/blue team exercises, a dedicated malware analysis sandbox, Active Directory lab environment, and containerized services via Docker. Network monitoring covers all segments with Zeek and Suricata. Regular vulnerability scanning with OpenVAS. All configurations managed as code for reproducibility.

Spear Phishing / BEC Analysis

Email Headers OSINT Python MITRE ATT&CK

Analyzed real-world business email compromise (BEC) and spear-phishing campaigns. Performed header analysis, sender reputation checks, URL/domain investigation, and payload extraction. Mapped tactics to MITRE ATT&CK framework and produced incident reports.

Developed Python scripts for automated header parsing and IOC extraction. Created detection rules for common BEC patterns. Documented social engineering techniques observed in the wild and built awareness training materials based on findings.

NCWF CTF & Cyber Dives

CTF Blue Team Incident Response NCWF AZ03

Badged volunteer at the National Cyber Workforce Framework AZ03 cyber range. Participate in and help facilitate Capture the Flag competitions, defensive exercises, and cyber dive training events for students and professionals.

Contribute to exercise design, range infrastructure setup, and mentoring participants. Focus on blue team defensive scenarios including log analysis, incident response procedures, and threat hunting. Help bridge the gap between classroom knowledge and operational skills.

PacketPursuit.net

HTML/CSS/JS Cloudflare Pages Claude API CI/CD

This portfolio site — built from scratch with a terminal-inspired dark theme. Features a Claude-powered chatbot, automated threat intel feeds, and auto-deploys from GitHub to Cloudflare Pages on every push to main.

Designed with a hacker/operator aesthetic using custom CSS animations (scanline overlay, typing effects, fade-in observers). Integrated Claude API chatbot provides visitors with information about projects and background. Blog section supports both manual writeups and automated threat intelligence posts via Cowork automation pipeline.

> CTF Writeups & Labs_

> HackTheBox / TryHackMe writeups coming soon...

Check back for walkthroughs, flag captures, and methodology breakdowns.