THE LAB

Methodology over deliverables. This is where I run experiments, practice attack patterns, and study defenses — all against my own controlled gear.

LEGAL DISCLAIMER

Every offensive technique demonstrated here is performed exclusively against hardware, networks, and accounts that I personally own and control, or in dedicated containerised lab environments. Nothing on this page condones, encourages, or facilitates unauthorised access to systems you do not own. Always test on your own infrastructure or with explicit written permission.

LAB / 01 ● ACTIVE

Wi-Fi Pen-Test Lab

A dedicated wireless attack/defense rig running against my own access points. Aircrack-ng, Reaver, Fluxion — used to study WPA2/WPA3 weaknesses, deauth flood patterns, and evil-twin detection signatures.

Captured 4-way handshakes (own AP)
WPS PIN brute-force timing analysis
Deauth packet detection rules
Evil-twin captive portal forensics
// READ FULL LOG
LAB / 02 ● ACTIVE

NFC / RFID Research

PN532 module + Pi for short-range RF protocol study. Reading my own access cards, analyzing MIFARE Classic protections, dumping & cloning blank tags for educational demos.

MIFARE Classic key recovery (own cards)
NDEF tag programming workflows
13.56 MHz reader range testing
Anti-cloning detection ideas
// READ FULL LOG
LAB / 03 ● ACTIVE

Bluetooth / BLE Recon

ESP32 Marauder + bettercap for BLE scanning, advertisement parsing, and proximity-based device fingerprinting. Studying how BLE beacons leak position and identity data in everyday environments.

Passive BLE advertisement collection
MAC randomization effectiveness study
GATT service enumeration
Tracking-resistant device design notes
// READ FULL LOG
LAB / 04 ● ACTIVE

Docker Cybersec Lab

A reproducible containerised practice environment — Kali, DVWA, Juice Shop, Pi-hole, plus a custom victim VM. docker compose up and the entire range is running in 90 seconds.

OWASP Top 10 walkthroughs (DVWA)
Modern app exploitation (Juice Shop)
Bridge-network packet inspection
Container escape research
// READ FULL LOG

CURRENT UPTIME

4
Active Labs
850+
Hours Logged
12
Tools In Rotation
6
Devices Deployed