Cybersecurity Projects

Hands‑on work in both Defensive Security and Offensive Security, completed during live‑project exercises and training labs.

Defensive Projects

Find the Culprit — Malware Network Traffic Analysis

Analyzed a PCAP in Wireshark/TShark to track a Windows host infected by malware. Identified suspicious DNS and HTTP beacons, traced C2 domains, and confirmed Trojan/backdoor activity. Delivered a structured incident report with IOCs, timeline, and containment recommendations including stricter egress filtering and DNS monitoring.

Malware Deep Investigation — PowerShell Keylogger

Investigated a malicious PowerShell keylogger with SMTP exfiltration. Uncovered hard‑coded credentials, registry‑based persistence, and DLL imports. Documented IOCs, decoded obfuscation, and recommended mitigations: block outbound SMTP, tighten endpoint telemetry, and enforce PowerShell execution policies.

Offensive Projects

OWASP Juice Shop Exploitation

Completed targeted tests against OWASP Top 10 categories. Highlights: SQLi authentication bypass, stored XSS, CAPTCHA bypass automation, weak‑credential discovery, path traversal to retrieve backup files, and review manipulation. Produced PoCs and mapped fixes: parameterized queries, hardened session controls, and improved access policies.