Work

Projects

Projects from my GitHub; hands-on experience across cloud, cybersecurity, and networks.

Complete

Deploying a Honeypot with T-Pot on AWS

This project documents the deployment of a T-Pot honeypot on an AWS EC2 instance. The goal was to capture malicious traffic and analyse attack patterns targeting cloud infrastructure.

AWS EC2 T-Pot Honeypot Cybersecurity Linux
View on GitHub →
Complete

Pi-hole with Docker on Raspberry Pi

Deploying Pi-hole as a network-wide ad blocker using Docker on a Raspberry Pi. Configured as a DNS sinkhole to block ads and trackers across all devices on the local network.

Raspberry Pi Docker Pi-hole DNS Networking Linux
View on GitHub →
Planned

AWS Security Alerts

AWS security alert pipeline. Using; GuardDuty, CloudWatch rule, SNS topic, email and phone which is verified with GuardDuty sample alerts.

AWS GuardDuty CloudWatch SNS Security
Planned

IAM Security Audit

Configuring an AWS account with intentionally misconfigured IAM policies, then identifying and remediating each issue. Documenting overly permissive roles, missing MFA, unused credentials, and the fixes applied.

AWS IAM Security Audit Cloud Security
Planned

Terraform

Infrastructure as code using Terraform to provision and manage cloud resources on AWS. Automating repeatable deployments and environment configurations.

Terraform IaC AWS Automation
Planned

Juiceshop

Practising web application security using OWASP Juice Shop — identifying and exploiting common vulnerabilities such as SQL injection, XSS, and broken authentication.

OWASP Web Security Pentesting Vulnerability
Planned

Metasploitable

Penetration testing practice against Metasploitable — a deliberately vulnerable Linux VM. Using Metasploit Framework to discover, exploit, and document vulnerabilities.

Metasploit Pentesting Vulnerability Linux
Planned

Malware Analysis Sandbox

Building an isolated sandbox environment to safely detonate and analyse malware samples. Capturing behavioural indicators, network traffic, and system changes.

Malware Sandboxing Security Analysis
Planned

SIEM Lab with Wazuh

Deploying Wazuh as an open-source SIEM in a virtual lab environment to collect and analyse logs. Building detection rules, creating dashboards, and documenting findings from simulated network traffic.

Wazuh SIEM Log Analysis Security Monitoring Linux

See all my repositories on GitHub

Visit github.com/ealdr →