Cybersecurity Projects & Research

Open-Source Tools, Case Studies & Device Hardening Guides

Explore real-world threat detection tools, documented attack case studies, and comprehensive device security checklists. All resources are free, open-source, and battle-tested against APT28 nation-state actors.

365
Days Under Attack
4
Device Checklists
100%
Free & Open Source

What Makes This Approach Different?

A glowing neon icon of a magnifying glass and a laptop, both displaying code symbols. The magnifying glass is blue, and the laptop is purple, set against a black background with a soft, colorful glow.

Algorithmic Behavioral Defense

Most cybersecurity teams respond to signals; I model them. I apply search-engine–style analysis to network and human behavior—profiling patterns, drift, and anomalies the way an algorithm detects manipulation.

A glowing neon icon of a magnifying glass and a laptop, both displaying code symbols. The magnifying glass is blue, and the laptop is purple, set against a black background with a soft, colorful glow.

Multi-Device Defensive Strategies

99% of my defense work used multi-tier, multi-device tactics. I fought adversaries across IoT, phones, Pineapples, Stingrays, cars’ Bluetooth, cell towers, laptops, and even energy/side-channel systems used for air-gapped attacks. I combine telemetry and cross-device correlation to detect attacks that single-device tools miss.

A glowing neon smartphone icon in blue and purple hues with a faint target symbol displayed on its screen, set against a black background.

Real-World AI Adversary Combat

Under eleven months of continuous targeting by Russian actors and local harassment networks, I reverse-engineered attack flows and AI-driven tactics in real time—discovering signature behaviors of automated intrusion and deception systems and developing tailored countermeasures.

A glowing neon line graph with three connected points, shown in blue and purple colors on a black background. The graph forms an upward zigzag pattern.

Built Tools Under Fire

Every tool and script I built was designed and hardened while actively under attack—live forensics, anomaly detectors, and containment tooling that worked in the field. These are survival-tested, not theoretical.

Free Cybersecurity Tools for Everyone

OPEN SOURCE BUILDS ON GITHUB

Ambient EMF Chaos Machine

Experimental environment for monitoring and manipulating ambient EMF patterns

Overview:
• Research and tooling for EMF signal behavior
• Ambient interference capture experiments
• Statistical chaos analysis integrations

Features:
• Multi-sensor data ingestion
• Signal pattern logging
• Real-time anomaly detection

Tech Stack:
• Python / Arduino / SDR integrations
• Data visualization stack
• Modular plugin system

Status:
• Experimental / active development
• Open-source prototype
• Invites research collaboration

Windsurf Privacy Enforcer – Historical Access Clear

One-click clearing of historical access and privacy residue

Overview:
• Automates clearing of historical access data
• Enforces privacy baselines across environments
• Repeatable, safe operations

Key Features:
• Scripted clean sequences
• Dry-run and confirmation options
• Integrates with existing workflows

Tech Stack:
• Node / Python scripts
• CLI interface
• Cross-platform focus

Status:
• Open-source
• Documentation in progress
• Great for privacy hygiene automation

Stingray Location Triangulator

Pineapple Express

Tools & tactics for detecting rogue AP cloning and Wi-Fi hijacking

Overview:
• Detect SSID clone behavior & suspicious auto-connect events
• Daily SSID rotation workflows
• Field notes for investigation hygiene

Toolkit:
• AP scanning & signal heuristics
• Isolation & recon safety procedures
• Response checklists

Tech Stack:
• Shell / CLI utilities
• Linux & macOS compatible
• Documentation-driven

Status:
• Public repo
• Community-friendly
• Actively refined

Persistent Wireshark (StealthShark)

Headless, scheduled packet captures with logs & activity dashboards

Overview:
• Start/stop monitor with configurable capture duration & interval
• Interface activity board with live status tracking
• Automatic rolling PCAP saves to chosen directory

Key Features:
• Multi-interface monitoring
• Activity / Logs / Files tabbed views
• Built for stealthy, persistent data collection

Tech Stack:
• Wireshark / tshark automation
• Electron or headless Node UI
• Tailwind-styled panels

Status:
• Actively evolving
• Open-source roadmap in progress
• Ideal for long-running investigations

Clock Stopper - NTP Detector

PhoneRootBot

Automation toolkit for mobile forensic baselines and device integrity checks

Overview:
• Establish baseline verification for mobile devices
• Perform repeatable checks & generate logs
• Assist in forensic triage workflows

Automations:
• Structured checklists
• Report generation
• Extensible hook system

Tech Stack:
• Python + ADB / CLI tools
• YAML-driven tasks
• Markdown report templates

Status:
• Open-source
• Actively evolving
• Community input welcome

Cybersecurity Tool Interest Form
Your Name