SHADOW

Threat Hunting | Infrastructure & Development | Automation

Jupyter Notebooks and Pandas for Security Analysis

SOC Automation with Inspector Gadget

Cloud Run Website with GCP

Iterations of this Site

Diagnosing Difficult Network Issues

Easter Eggs

Building my first Keyboard

Project Chaos

Python Debugging with Decorators

Chaos Analyst

Adventures from the Other Side of Phishing

Electric Blue - Lessons from a blue team securing Azure