Cybermap: Security Experience Timeline

A structured map of my progression from controlled labs to real-world incident analysis, focused on detection, investigation, and response.

The WordPress Security Incident that started as spam & led to the discovery of a full site compromise: Incident response in a real-world scenario.

My Step-by-step analysis of a phishing attack, from email delivery to credential theft and network-level evidence.

 It includes a robust user registration and login system with access control.

How to detect real-world network attacks using Wireshark and Snort, including Log4Shell, HTTP analysis, and custom IDS rule creation.

Inspire and be inspired with a click of a button, and meditate on a new quote.

This project documents the design and implementation of a personal blue-team detection lab using Windows telemetry and cloud-native SIEM monitoring.

Hands-on network traffic analysis Lab, learned how to detect ARP scans, DNS tunneling, and data exfiltration using Wireshark with real examples.

This dashboard helps users manage their income.