This collection does not include general work from my jobs or school, but rather standalone projects that may be unique or fall outside of normal day-to-day work.
Check my portfolio.cybersader.com to see normal work that I do.
Current Projects βPersonalGrad School - Masters in Cyber and Trusted Systems - IUPUI Future Projects πΎPast Projects / Backlog / On-Hold β
ARCHIVED Projects π¦Graduate School Research πWork Projects π’Personal Side Projects πUndergrad Projects π - University of Indianapolis
Current Projects β
Personal
- Cybersader.com (THIS WEBSITE)
- Knowledgebase Architecture and Contribution Workflow
- Blog Posts, Tutorials, and Projects
Grad School - Masters in Cyber and Trusted Systems - IUPUI
- GPT Utilization in Cybersecurity Problem Solving and Solution Research Approaches
- Training and Chatting Architectures and Technology Stack for Self-Hosted Specialized Chatbots
Future Projects πΎ
- Cynario - Scenario creator and player for interactive learning and practice. Graph-based application
Past Projects / Backlog / On-Hold β
- Notion-to-Ghost Converter
- WebsiteTechMiner-py β - Automate gathering website profiling data from βBuiltWithβ & βWappalyzerβ for tech stack information, technographic data, website reports, website tech lookups, website architecture lookups, etc. All done with APIs, Python, and simple configuration.
- Uses of WebsiteTechMiner
- ποΈ Data Privacy Activities
- Vendor Discovery for Websites
- Risk Management
- Data Privacy Read-Ahead Material for Privacy Assessments
- π₯οΈ Cyber Security Activities
- Reconnaissance
- OSINT
- πΊοΈ Other Discovery Activities
- Business Intelligence
- Marketing Activities
- Competition Analysis
ARCHIVED Projects π¦
- AI-Based Meal Calculator
Graduate School Research π
4 Awesome Papers! π π½π½π½π½
Grad School Papers and PresentationsWork Projects π’
- Infrastructure Endpoint/Workstation Security Hardening
- Qualitative risk assessment
- Pragmatic approach to large-scale hardening efforts and prioritization of risks
- Procurement Pipeline Engineering
- Discovery and visibility efforts in Data Privacy
- User data lineage and data mapping β one of the hardest parts about data privacy. Iβve explored the deep and high-level landscape or creating a data mapping process to keep track of user data (where its coming from, where it is processed, and where it is shared or outputted).
- Custom vendor monitoring and visibility solution with cloud technologies and development using multiple frameworks and languages
Personal Side Projects π
- Cryptography-Based Scavenger Hunt Proposal Game
- Used Vigenere cipher for symmetric encryption manually along with SHA256 for passphrase checking. All built in Webflow with embedded scripts, animations, and a simply elegant interface.
- Used a set of physical keys, riddles, ciphers, hashing, and Javascript libraries to lead to a proposal spot for my fiancΓ©.
- I figured out that there are some niche use cases for seemingly obsolete cryptographic algorithms.
- Vigenere cipher is virtually unbreable in my implementation because frequency-based cryptanalysis to find patterns is not doable with small ciphertexts.
- Notion to Ghost Blog Converter
- Created a client-to-serverless proxy-to-API architecture for running decentralized API solutions.
- Developed a system for converting my knowledgebase content into markdown content for Ghost - a markdown-based CMS (content management system) used for blogging.
Undergrad Projects π - University of Indianapolis
- PoseTracker πββοΈ
- AI-based pose and exercise classification component library that can be used to build mobile applications using React Native. The AI uses the BlazePose pose estimation library combined with some stateful programming, configurable inputs to components, a pose/exercise training system, and the ability to count and track multi-step pose movements or exercises β there is no other library that has done this yet. Put simply, you could train and count burpees.
- Student Organization Website - Uindy
- Design, integrations, server-side input validation, basic web development, security, data privacy (notice & policy)
- Used Webflow, custom native Javascript, and PHP running on an AWS EC2 Apache server.
- GUI Class - (React JS framework)
- Cyber Scenario/Kill Chain Builder Game β precursor to future βCynarioβ app/game
- For my GUI class, I coded a text-based RPG game that is supposed to loosely emulate the cyber kill chain. This could be a really effective and fun way to learn cybersecurity in the realm of education. You can emulate any number of events or scenarios with this method. I coded this using the React JS framework. The magic is in the parsing of JSON objects.
- Co-Author of a Scholarly Article
- Programmed a discrete fourier transform program in C++. I literally understood nothing about this level of math, but managed to create a program with another student that did some heavy lifting to process his data.
- https://onlinelibrary.wiley.com/doi/abs/10.1002/pssa.202100111