Projects
Hands-on security research, exploit development, and digital forensics workflows.
Full DFIR Workflow: Linux Memory Acquisition & Forensic Triage
Kali Linux + LiME + SANS SIFT
Complete incident response simulation covering live memory capture, hashing, triage, artifact extraction, IOC hunting, persistence detection, and structured evidence handling.
View Full Project →
Exploiting christmas_tree.bin — MetaCTF Binary Exploitation
Pwntools • GDB • ROP • ret2win
Reverse engineering and exploitation of a hardened ELF binary using partial return address overwrite and strategic brute-force ASLR bypass.
View Full Project →
iPhone 17 Digital Forensics Using EIFT and MVT
iOS DFIR • EIFT • MVT • Pegasus Analysis
Complete iPhone 17 forensic workflow covering data acquisition, backup analysis, IOC scanning, and Pegasus detection in a controlled lab environment.
View Full Project →