Cybersecurity Projects & Research
Open-Source Tools, Case Studies & Device Hardening Guides
Explore real-world threat detection tools, documented attack case studies, and comprehensive device security checklists. All resources are free, open-source, and battle-tested against APT28 nation-state actors.
What Makes This Approach Different?

Algorithmic Behavioral Defense
Most cybersecurity teams respond to signals; I model them. I apply search-engine–style analysis to network and human behavior—profiling patterns, drift, and anomalies the way an algorithm detects manipulation.

Multi-Device Defensive Strategies
99% of my defense work used multi-tier, multi-device tactics. I fought adversaries across IoT, phones, Pineapples, Stingrays, cars’ Bluetooth, cell towers, laptops, and even energy/side-channel systems used for air-gapped attacks. I combine telemetry and cross-device correlation to detect attacks that single-device tools miss.

Real-World AI Adversary Combat
Under eleven months of continuous targeting by Russian actors and local harassment networks, I reverse-engineered attack flows and AI-driven tactics in real time—discovering signature behaviors of automated intrusion and deception systems and developing tailored countermeasures.

Built Tools Under Fire
Every tool and script I built was designed and hardened while actively under attack—live forensics, anomaly detectors, and containment tooling that worked in the field. These are survival-tested, not theoretical.






