Analysis of Malware Signatures
Oct 2024
An investigation into polymorphic code structures in modern ransomware.
Read PDF [PDF]ROOT@SYSTEM:~$ _
IT Specialist | Digital Forensics | Class of 2026
root@user:~$ cat profile.txt
Information Technology student specializing in Digital Forensics
and Incident Response.
Fascinated by the digital breadcrumbs left behind by threat actors. Currently building a lab
environment
to simulate APT attacks and analyze malware signatures.
> Education: B.S. Information Technology (2026)
> Focus: Cyber Defense, File System Analysis
Oct 2024
An investigation into polymorphic code structures in modern ransomware.
Read PDF [PDF]Feb 2025
Using Wireshark to identify covert channels in TCP/IP packets.
Read PDF [PDF]A custom tool built with Scapy to intercept and analyze HTTP headers.
View on GitHubAutomated script for extracting deleted artifacts from NTFS volumes.
View on GitHub| EVENT | CATEGORY | CHALLENGE | STATUS |
|---|---|---|---|
| HackTheBox | Forensics | Obscure_File | [SOLVED] |
| PicoCTF 2024 | Cryptography | RSA_Pop_Quiz | [SOLVED] |
| National Cyber League | Log Analysis | Server_Breach_01 | Rank: Top 10% |
| TryHackMe | Red Teaming | Active_Directory | [IN_PROGRESS] |