Skip to content
MB

Projects

Proof of work, structured like technical case studies.

This is not a gallery. Each project is designed to show context, architecture thinking, security considerations, trade-offs, and implementation depth.

SOCDetection EngineeringIAM

Panther ASOC

An automated, scalable open-source SOC environment focused on proactive detection, response, IAM integration, hardening, and resilience.

Proxmox VEpfSenseActive DirectoryWazuhAnsible
View case study
Offensive ResearchShellcodePython

Venom

A controlled research project exploring customizable and obfuscated reverse shell shellcode generation in Python and x86_64 assembly.

Pythonx86_64 AssemblyLinux SyscallsRich CLIPayload Encoding
View case study
MFAEntra IDRollout

Enterprise MFA rollout architecture

A future case study on MFA deployment strategy, identity grouping, communication, rollout KPIs, and adoption risk control.

Microsoft Entra IDMFAKPI TrackingIdentity Groups
View case study
RBACAccess GovernanceIAM

RBAC and identity model design

A future case study on building practical role models, access governance flows, and reviewable permissions.

RBACAccess ReviewsIdentity DataGovernance
View case study
Active DirectoryPowerShellAudit

Active Directory audit automation

A future writeup on PowerShell automation for inactive accounts, delegation, access traceability, and recurring AD reporting.

Active DirectoryPowerShellCSV ReportingAccess Reviews
View case study
IAMAdvisoryMaturity

IAM maturity assessment framework

A future consulting framework for evaluating authentication, lifecycle, access governance, privileged access, and monitoring maturity.

IAM ControlsAssessmentRoadmappingGovernance
View case study
OAuth2OIDCB2B

OAuth2 / OIDC integration patterns for B2B systems

A future technical case study on OAuth2, OIDC, PKCE, token design, API gateway integration, mTLS, and developer specifications.

OAuth2OIDCPKCEmTLSApigee
View case study