Projects

Hands-on security research, exploit development, and digital forensics workflows.

Full DFIR Workflow: Linux Memory Acquisition & Forensic Triage

Kali Linux + LiME + SANS SIFT

Complete incident response simulation covering live memory capture, hashing, triage, artifact extraction, IOC hunting, persistence detection, and structured evidence handling.

View Full Project →

Exploiting christmas_tree.bin — MetaCTF Binary Exploitation

Pwntools • GDB • ROP • ret2win

Reverse engineering and exploitation of a hardened ELF binary using partial return address overwrite and strategic brute-force ASLR bypass.

View Full Project →

iPhone 17 Digital Forensics Using EIFT and MVT

iOS DFIR • EIFT • MVT • Pegasus Analysis

Complete iPhone 17 forensic workflow covering data acquisition, backup analysis, IOC scanning, and Pegasus detection in a controlled lab environment.

View Full Project →