Featured
View All →
How Cloudflare Works: A Security Blueprint
A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.
Read more →
How to Install Snort 3 on Kali Linux (Step-by-Step Guide)
A complete step-by-step guide to installing Snort 3 on Kali Linux using both repository and source-based methods — including dependencies, configuration, and verification.
Read more →
Splunk Part 02: MITRE ATT&CK Framework and Behavioral Mapping
Learn how to map security events in Splunk to the MITRE ATT&CK framework — understanding adversary behavior, tactics, techniques, and how to align your detections accordingly.
Read more →HomeLab Projects
View All →Building a Cybersecurity Home Lab
Step-by-step guide to setting up your own cybersecurity home lab for hands-on learning and practice.
Network Forensics and Full Packet Capture in the Home Lab
Implement full packet capture and network forensics workflows to analyze and investigate security incidents in your home lab.
Deploying Vulnerable Applications
Setting up intentionally vulnerable applications in your home lab for ethical hacking practice.
Other Projects
View All →The Basics and Brief of Secure Software Development Lifecycle (SDLC) Checklist
Essential, actionable security requirements to ensure secure coding practices are integrated throughout the software development lifecycle.
Building a Custom Password Manager with Encryption
Create your own secure password manager using modern encryption techniques and best security practices.
Advanced Network Scanner
A comprehensive Python-based network scanning and security assessment tool with advanced features for security analysis and network mapping.
Blog
View All →
How Cloudflare Works: Part 2 — Testing & Hardening
Practical validation steps to confirm Cloudflare proxying, TLS (Full strict), WAF behavior, rate limiting, bot mitigation, and DNSSEC.
Splunk Part 02: MITRE ATT&CK Framework and Behavioral Mapping
Learn how to map security events in Splunk to the MITRE ATT&CK framework — understanding adversary behavior, tactics, techniques, and how to align your detections accordingly.
Getting Started with Splunk: Installation and SPL Basics for Security Monitoring
Learn how to install Splunk Enterprise and write your first SPL searches for security monitoring — a practical beginner's guide for cybersecurity professionals and home lab users.