Project Portfolio

  • Creating a Honeypot server for threat intel IOC matching

    Creating a Honeypot server for threat intel IOC matching

    Honeypot using IONOS VPS and Cowrie I want to create a safe honeypot to try to capture malicious IPs and perform research on them. To do so, I am going to run a cheap VPS in the cloud and remotely pull logs from it. Requirements Optional Outcomes Step #1: Login to public facing VPS using…

  • Greenbone Vulnerability Scanning on Proxmox

    Greenbone Vulnerability Scanning on Proxmox

    Greenbone on Proxmox I want to run a vulnerability scanner from my Proxmox instance. Greenbone provides a solution, but its native format is meant for VirtualBox or VMware. In this blog, we are going to upload the OVA image to Proxmox and adjust it to be compatible with our system. Requirements: Software Outcomes Step #1:…

  • Homelab build Components

    Homelab build Components

    Desktop Hardware inventory Component Item Specs / Notes Case ​NZXT H7 Flow 2024 – Mid-Tower ATX Airflow Case​ Airflow-focused, 3 x 120mm pre-installed fans, supports bottom-mounted GPU fans, good cable management Power Supply ​Corsair RM850x – 850W Fully Modular PSU​ ATX 3.1 compliant, PCIe 5.1 support, Cybenetics Gold, 12V-2×6 cable ready CPU AMD Ryzen 7…

  • How I built my own Autonomous SOC

    How I built my own Autonomous SOC

    This project has the goal of creating a production security stack, with the capability to gain visibility into all alerts without the alert fatigue experienced by an individual homelabber. This article assumes you have ELK installed, if you have not done that, navigate to my other blog on the subject at: ELK Stack Install Project…

  • How to install a open-source firewall on Raspberry Pi 4

    How to install a open-source firewall on Raspberry Pi 4

    IPFire On Raspberry Pi The goal of this project is to get an open source firewall distribution to boot in a raspberry pi so I can get a inline firewall for my network. I want to get an idea of who is trying to break in from the outside, increase my security from external attackers…

  • Ingesting Cribl logs into Amazon S3 bucket

    Ingesting Cribl logs into Amazon S3 bucket

    In this blog, we will learn how to send Cribl Edge logs to a data lake. The purpose of doing this is to store logs in a cost-effective, long-term storage solution without needing to use or store them in a SIEM. This approach allows for incident response investigations if needed, while avoiding the necessity of…

  • Jerry

    Jerry

    Jerry is a machine that uses Apache Tomcat, an open-source application designed to serve web pages developed in Java. We are going to exploit this machine using Metasploit. First, let’s confirm we have a connection to the target machine by using the ping tool, and then check for running applications using nmap. ​ You can…

  • Setting up secure email automation with Proton Bridge and MCP

    Setting up secure email automation with Proton Bridge and MCP

    Proton Bridge Email Automation using Docker MCP and Claude I want to create a secure email automation system that doesn’t compromise on privacy. Most email automation tools require storing credentials in third-party services and granting broad access permissions. Requirements Outcomes Step #1: Create the MCP Server Files Set up your project directory and create the…


“It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat.”

Theodore Roosevelt