Projects
This section highlights what I've built, what I'm building, and where I'm headed next. I'm especially interested in projects that combine automation with real-world detection challenges.
Now: Expanding functionality of Snortgen and x-weird-for.
Next: Red Team environment setup and practice for PenTest+ and token validation and passing project in Python.
Snortgen
A command-line tool for interactively generating Snort IDS rules with built-in input validation, auto-incremented SIDs, and support for advanced modifiers like content matching, PCRE, and metadata. Dockerized and designed for quick, reliable rule creation in security workflows.
View on GitHubx-weird-for
A Python-based CLI tool for detecting anomalous HTTP headers using a hybrid of machine learning (Isolation Forest) and custom heuristics. Designed for security analysts, it parses raw headers, extracts behavioral features, and flags suspicious patterns for further inspection. Useful for detecting evasion techniques, malformed requests, and potential reconnaissance activity.
View on GitHubHTTP/1.1 Server in Go
A minimalist HTTP server written in Go that builds HTTP functionality from raw TCP sockets. Implements chunked transfer encoding, trailer headers, and custom routing without relying on the standard `net/http` package. Great for learning internals and building controlled, testable backend behavior from the ground up.
View on GitHubComing Soon!
This is a temporary placeholder for upcoming projects I am migrating and publishing. These will include security tooling, detection logic, and analysis workflows.
View on GitHub