DARK
LIGHT

Work

Projects

Projects from my GitHub; hands on experience across cloud, cybersecurity, and networks.

📌 Complete
ealdr/Deploying-a-Honeypot-with-T-Pot-on-AWS

Deploying a Honeypot with T-Pot on AWS

This project documents the deployment of a T-Pot honeypot on an AWS EC2 instance. The goal was to capture malicious traffic and analyse attack patterns targeting cloud infrastructure.

AWS EC2 T-Pot Honeypot Cybersecurity Linux
View on GitHub →
Complete
ealdr/Pi-hole-with-Docker-on-Raspberry-Pi-Project-

Pi-hole with Docker on Raspberry Pi

Deploying Pi-hole as a network-wide ad blocker using Docker on a Raspberry Pi. Configured as a DNS sinkhole to block ads and trackers across all devices on the local network.

Raspberry Pi Docker Pi-hole DNS Networking Linux
View on GitHub →
Planned
ealdr/AWS-Security-Alert-Project

AWS Security Alerts

AWS security alert pipeline. Using; GuardDuty, CloudWatch rule, SNS topic, email and phone which is verified with GuardDuty sample alerts.

AWS GuardDuty CloudWatch SNS Security
Planned

Terraform

Infrastructure as code using Terraform to provision and manage cloud resources on AWS. Automating repeatable deployments and environment configurations.

Terraform IaC AWS Automation
Planned

Juiceshop

Practising web application security using OWASP Juice Shop — identifying and exploiting common vulnerabilities such as SQL injection, XSS, and broken authentication.

OWASP Web Security Pentesting Vulnerability
Planned

Metasploitable

Penetration testing practice against Metasploitable — a deliberately vulnerable Linux VM. Using Metasploit Framework to discover, exploit, and document vulnerabilities.

Metasploit Pentesting Vulnerability Linux
Planned

Malware Analysis Sandbox

Building an isolated sandbox environment to safely detonate and analyse malware samples. Capturing behavioural indicators, network traffic, and system changes.

Malware Sandboxing Security Analysis
Planned

Cyber Attack Response Plan

Developing a structured incident response plan covering detection, containment, eradication, and recovery phases for common cyber attack scenarios.

Incident Response Security Documentation
Planned

Wireshark

Network traffic analysis using Wireshark to capture and inspect packets, identify protocols, and detect anomalies or suspicious activity on a network.

Wireshark Network Analysis Packet Capture Networking

See all my repositories on GitHub

Visit github.com/ealdr →