Posts & Projects

Protocol Weaknesses Using Real-World Exploits

Protocol Weaknesses Using Real-World Exploits

A Modern Cryptographic Variant of the Dining Cryptographers Protocol

A Modern Cryptographic Variant of the Dining Cryptographers Protocol

Authentication Protocols 101

Authentication Protocols 101

Defending Against Mail Bomb Attacks with KQL & Automation

Defending Against Mail Bomb Attacks with KQL & Automation

Home Lab

Home Lab