Hello, I'm James

A Cybersecurity Researcher, System Administrator, and Network Analyst.

I specialize in systems administration, network analysis, and information security best practices.

About Me

Background

I am a cybersecurity researcher with a start in basic computer programming. I've worked with various computer systems and networking equipment and have learned industry best practices as I have progressed.

My current focus is on identifying vulnerabilities, developing security solutions, and keeping up to date with the current and ever evolving industry.

Expertise

With a strong foundation in system administration, virtualization and network security, I specialize in both offensive and defensive security practices. I am currently working in the world of RF satellite communications.

I'm intruigued by our constantly changing field that is Cybersecurity. Everyday is a new challenge to see and learn to overcome.

Security

  • • Penetration Testing
  • • Vulnerability Assessment
  • • Threat Analysis

Network

  • • Network Analysis
  • • Packet Inspection
  • • Firewall Configuration
  • • IDS/IPS

Systems

  • • Linux Administration
  • • Windows Server
  • • Systems Management
  • • System Hardening

Tools

  • • Wireshark
  • • Nmap
  • • Python

Projects

A selection of projects showcasing development and cybersecurity research.

Coding

Host_Tester

Tests wether or not a host/IP is online - has a FQDN - and provides traceroute

Shell
Updated Nov 2024 View Repo

Network_Mapper

Network Mapper written in Python with Visual Network Map

Python
Updated Nov 2024 View Repo

Subdomain_enum

Tool for Subdomain Enumeration written in Python

Python
Updated Nov 2024 View Repo

Security/Networking

Vulnerable AD Network

A Vulnerable Active Directory Network. Complete with vulnerable low level accounts and machines, through to a compromised domain controller.

Active Directory Privilege Escalation Network Security

Exposed Azure Honeypot

An exposed Azure machine with logging enabled to view active attacks. Learning about current vulnerabilities being used in the wild and to log for future testing/analysis.

Azure/Cloud Logging Security Audit

Exploiting Agentic A.I.

An environment set up with Agentic A.I. to learn and exploit the framework. To learn new methods on jailbreaking agentic A.I. frameworks, and mold the A.I. to adapt to new prompting.

Agentic A.I. Jailbreak Penetration Testing

Get in Touch

Do you have questions? Want to know more? Feel free to reach out.