Intro

My Techventure

Imagine a world where data tells stories, machines think, and digital fortresses stand strong. That’s the world I’m stepping into, equipped with a passion for cybersecurity, a thirst for knowledge, and a laptop!

As a third-year BSCS student and Silver Medalist Associate Engineer specializing in Computer Information Technology, I’m not just learning to write code – I’m shaping the future of technology. My journey? It’s like a hacker entering a digital realm full of opportunities, but instead of hacks, I’m diving deep into:

🔬 Cybersecurity: Building digital armor to protect data, because the more we connect, the more we need to secure.
🕵️ Ethical Hacking: Thinking like the enemy to outsmart cybercriminals. I'm on the frontline of the digital defense!
📡 Penetration Testing: Testing the limits, exploiting vulnerabilities, and patching them up to keep systems safe.
🖥️ Security Operations Center: Analyzing and responding to security incidents in real-time to safeguard critical systems. I aim to be the SOC Analyst who defends the digital world from malicious attacks.
🔒 Blue Team: In the cybersecurity battlefield, I’m part of the Blue Team, responsible for fortifying defenses, monitoring, and detecting threats before they strike. Together with my team, I work on proactive defense strategies, ensuring systems remain secure.
🤖 Networking: Crafting the backbone of the internet, one packet at a time.

Though I’m still evolving in these fields, my skills are sharpening fast, much like a player leveling up in a role-playing game. Each challenge is an opportunity, every project a milestone, and every bit of code I write brings me closer to becoming a top-tier SOC Analyst.

Why am I doing this? Because in a world where digital threats are constantly evolving, I aim to be more than just a spectator. I’m here to create solutions, protect the digital world, and, maybe – just maybe – drive positive change in the cybersecurity landscape.

Stick around! Whether you’re a fellow hacker, a Blue Team expert, a SOC mentor, or simply someone curious about the tech world, I promise you one thing: My journey will be full of surprises and challenges.

"Ready to hack the system and uncover its secrets? Let’s dive into the code!"

"In the world of zeros and ones, I’m the shield that turns breaches into just another bad password."

Home

Projects

Project #01

File Integrity Monitoring (FIM) using Wazuh

File Integrity Monitoring (FIM) is a crucial security feature that tracks and detects unauthorized changes to critical files and directories. It continuously monitors files for modifications, additions, and deletions, ensuring that any unexpected or suspicious changes are quickly identified. FIM helps organizations maintain the integrity of their systems, prevent unauthorized access, and meet compliance requirements such as PCI-DSS, HIPAA, and GDPR. It generates real-time alerts, enabling security teams to investigate potential threats before they escalate.




Project #02

Vulnerability Detection (VD) using Wazuh

Vulnerability Detection (VD) identifies weaknesses within an organization’s systems and applications by scanning software versions, configurations, and installed packages. It compares these elements against a comprehensive vulnerability database, such as the National Vulnerability Database (NVD), to detect known security flaws. By providing detailed reports on discovered vulnerabilities, Wazuh enables organizations to prioritize remediation efforts, minimize attack surfaces, and maintain a robust security posture. This proactive approach helps prevent exploitation by cybercriminals.




Project #03

Brute Force Attack (BFA) Detection using Wazuh

Brute Force Attack Detection (BFA) identifies and alerts security teams to repeated login attempts aimed at guessing passwords or gaining unauthorized access to systems and applications. It monitors authentication logs and network traffic for patterns indicative of brute force attacks, such as multiple failed login attempts from a single IP address within a short time frame. By detecting these attacks early, Wazuh helps organizations prevent unauthorized access, secure sensitive data, and maintain system availability. Security teams can also configure automatic responses, such as blocking the attacker’s IP address.




Project #04

Malware Detection (MD) through VirusTotal Integration using Wazuh

Malware Detection (MD) integrates with VirusTotal, a leading threat intelligence platform, to identify malicious files and processes within an organization’s systems. Wazuh collects file hashes and sends them to VirusTotal, which analyzes the hashes using its vast database of malware signatures from multiple antivirus engines. If a match is found, Wazuh generates an alert, enabling security teams to quickly respond and remove the threat. This integration enhances an organization’s malware detection capabilities by leveraging collective intelligence from global security vendors.




Project #05

Monitoring Execution of Malicious Commands (MC) using Wazuh

Monitoring Execution of Malicious Commands (MC) detects and alerts security teams when suspicious or unauthorized commands are executed on monitored systems. By analyzing system logs and shell command histories, Wazuh identifies commands commonly used in cyberattacks, such as privilege escalation attempts, reverse shells, and data exfiltration scripts. This feature helps organizations detect attacks in their early stages, preventing unauthorized access, data breaches, and system compromise. Security teams can configure custom rules to detect specific command patterns relevant to their environment.




Project #06

Blocking Known Malicious Actors (MA) using Wazuh

Blocking Known Malicious Actors (MA) prevents connections from IP addresses and domains associated with cybercriminals, malware distribution, and other malicious activities. Wazuh maintains an up-to-date threat intelligence database that includes known malicious entities, sourced from reputable providers such as AlienVault OTX and AbuseIPDB. When a monitored system detects traffic from a listed IP address or domain, Wazuh can automatically block the connection and generate an alert. This proactive defense mechanism reduces the risk of unauthorized access, data theft, and malware infections.




Project #07

PyPortScanner (PyPS)

PyPortScanner is a simple Python-based network tool designed to help network administrators and security professionals perform port scanning on a target host. This tool allows users to scan a list of specified ports on a given target host and provides information about the status of each port (open or closed). It also displays well-known port descriptions for reference, making it a useful tool for identifying potential vulnerabilities and discovering services running on the target system.




Project #08

PassCracker

PassCracker is a powerful and versatile password-cracking tool designed to decode various cryptographic hash functions commonly used in cybersecurity. Developed using Python, PassCracker provides an efficient and user-friendly solution for security professionals and ethical hackers to test the strength of passwords stored in hash formats.




Project #09

PasswordGuard

PasswordGuard or Password Generator and Strength Checker is a versatile and user-friendly Python application designed to help users enhance their online security by creating and evaluating strong passwords. With the PasswordGuard utility, you can effortlessly generate robust, random passwords or assess the strength of your existing passwords.




Project #10

PYMAF

PYMAF is an innovative technology project to elevate security, convenience, and user identification in various applications and industries. This system harnesses state-of-the-art computer vision and artificial intelligence algorithms to identify and authenticate individuals based on facial features.


Home

Contact

If you'd like to learn more about my background and experiences, you can download my resume/CV using the link below:

Home