Lab
Small projects, experiments, research notes, and technical explorations. A research log, not a startup portfolio.
-
Docker security basics
Isolating workloads and reading the fine print.
Practical notes on container isolation, capabilities, and how to interpret Docker configuration from a security perspective.
-
Phishing kit teardown
What’s inside a typical credential-harvesting pack.
A structural walkthrough of a common phishing kit and how credentials are collected and exfiltrated.
-
JWT testbed
Algorithm confusion and key handling.
A small local application used to experiment with JWT signing algorithms and validation mistakes.
-
Linux hardening notes
Kernel params, sysctl, and minimal services.
Notes from building a minimal hardened Linux system with reduced attack surface.
-
Detection experiment
Testing a simple rule against sample traffic.
Running a simple detection rule against generated log samples and documenting the tuning process.