Open to Opportunities

Exploring the Frontiers
of Cybersecurity

A documentation hub for security projects I've built and shipped. From post-quantum cryptography implementations to SOC infrastructure, covert communications, and threat detection systems.

View Projects GitHub
6+ Projects Shipped
3 Security Domains
Hands-on Security

My Projects

Original builds from scratch. Detailed breakdowns.

Post-Quantum IoT

Optimized PQC on IoMT

23× faster quantum-safe handshakes on ESP32 medical sensors using optimized ML-KEM-512 with pre-provisioned keys and session resumption.

ESP32 ML-KEM-512 AES-256-GCM MQTT
View Details
Post-Quantum Cryptography

PQ-RGuard Phase 1

Pi-to-Pi KEMTLS implementation with ML-KEM-512, mutual authentication, and encrypted device-bound key storage. Handshake optimization and ESP32 migration planned as future work.

C Raspberry Pi ML-KEM-512 KEMTLS
View Details
Blue Team / SIEM

Azure Sentinel Honeypot

SOC environment with 3 honeypot VMs (2 Windows, 1 Linux) integrated with Microsoft Sentinel. Built custom KQL detection rules for brute force, privilege escalation, and firewall tampering mapped to MITRE ATT&CK.

Azure Sentinel KQL MITRE ATT&CK
View Details
Web Security

Web Security Proxy Analysis

TLS termination proxy demonstrating host header injection, HTTP method tampering, cookie manipulation, and HTTP vs HTTPS traffic analysis using Burp Suite, ZAP, and Fiddler.

Burp Suite OWASP ZAP Fiddler XAMPP
View Details
Cryptanalysis

Encryption & Cryptanalysis

Two-phase project: custom block-cipher combining substitution/Caesar shifts with Fisher-Yates key generation, then cryptanalysis via frequency analysis, bigrams/trigrams, and Levenshtein dictionary validation.

C Encryption Frequency Analysis
View Details
OWASP / Pentesting

WebGoat OWASP Top 10

Hands-on exploitation of OWASP Top 10 (A1-A10): SQL injection (blind, boolean-based), IDOR user profile access, XXE→SSRF, JWT attacks, session hijacking, and XSS using WebGoat.

Kali Linux Docker WebGoat Burp Suite
View Details
Network Steganography

COTIIP

Covert channel using incomplete IP fragments and modulo-encoded IP IDs to transmit hidden messages undetected by IDS/IPS systems.

Python Scapy TCP/IP Wireshark
View Details

About

mh@security:~
$ whoami
mhbuilds
$ cat interests.txt
threat detection and hunting
SIEM and SOC operations
incident response
network security
$ ./status.sh
Open to opportunities...
$ _

A documentation hub for security projects I've built and shipped. From post-quantum cryptography implementations to SOC infrastructure and threat detection systems.

Each project breaks down the concepts, explains the "why" behind technical decisions, and walks through real implementations. Built for security professionals, students, and anyone who learns by seeing how things actually work.

Whether you're exploring similar problems, looking for reference implementations, or just want to understand these topics deeper, dive in.

Let's Connect

Working on something similar? Have questions about a project? Let's connect.