THE LAB
Methodology over deliverables. This is where I run experiments, practice attack patterns, and study defenses — all against my own controlled gear.
Every offensive technique demonstrated here is performed exclusively against hardware, networks, and accounts that I personally own and control, or in dedicated containerised lab environments. Nothing on this page condones, encourages, or facilitates unauthorised access to systems you do not own. Always test on your own infrastructure or with explicit written permission.
Wi-Fi Pen-Test Lab
A dedicated wireless attack/defense rig running against my own access points. Aircrack-ng, Reaver, Fluxion — used to study WPA2/WPA3 weaknesses, deauth flood patterns, and evil-twin detection signatures.
NFC / RFID Research
PN532 module + Pi for short-range RF protocol study. Reading my own access cards, analyzing MIFARE Classic protections, dumping & cloning blank tags for educational demos.
Bluetooth / BLE Recon
ESP32 Marauder + bettercap for BLE scanning, advertisement parsing, and proximity-based device fingerprinting. Studying how BLE beacons leak position and identity data in everyday environments.
Docker Cybersec Lab
A reproducible containerised practice environment — Kali, DVWA, Juice Shop, Pi-hole, plus a custom victim VM. docker compose up and the entire range is running in 90 seconds.