Publications
Papers & Guides
Security research, technical guides, and methodological write-ups. Content ranges from practitioner field notes to formal research papers.
ARCHITECTUREActiveApr 2026
MOD-OSINT — Architecture & Development Lifecycle
Complete architecture document for the MOD-OSINT entity intelligence platform. Covers the full 6-phase development lifecycle, team role structure, UML system diagrams, event-bus flowcharts, git branch strategy, handoff schema, context snapshot format, and annotated pseudocode. Phase 0 complete; Phase 1 (intelligence module layer) active.
#OSINT#Architecture#Python#Graph Database#FastAPI#MITRE ATT&CK
Open Interactive Document ↗TOOL PORTALActiveApr 2026
Kali Tool Documentation Portal — Burp Suite CE & Bettercap
Interactive reference portal for two foundational Kali Linux tools. Burp Suite Community Edition: intercepting proxy, HTTP/S traffic inspection, Proxy/Repeater/Intruder/Decoder/Comparer module model, TLS trust architecture, and workflow documentation. Bettercap: session-based modular network inspection framework, caplet automation, module layer taxonomy, defensive indicators, and log normalization patterns. 44 searchable tabs with copy-enabled code blocks.
#Burp Suite#Bettercap#Kali Linux#Web Security#Network Inspection#Proxy
Open Interactive Document ↗TOOL REFERENCEIn ProgressApr 2026
Kali Tool Reference — Burp Suite CE & Bettercap
A structured reference guide covering Burp Suite Community Edition and Bettercap — their architectures, module models, operational envelopes, defensive perspectives, and integration patterns within authorized security research workflows. Written for practitioners in the Cyber Forensics Training and MOD-OSINT research tracks.
#Burp Suite#Bettercap#Web Security#Network Analysis#Kali Linux#Proxy#Protocol Inspection
Read Full Paper →RESEARCH PAPERIn ProgressApr 2026
Wireless Audit Pipeline: An Event-Driven 802.11 Security Assessment Framework
A modular, event-driven Python pipeline that automates 802.11 wireless security assessment — from raw frame capture through structured vulnerability scoring, graph visualization, attack vector recommendation, and formal report generation. Developed as cybersecurity research for CIT under University of Michigan-Flint supervision.
#802.11#Wireless Security#Python#Event-Driven Architecture#OSINT#Network Forensics#Kali Linux
Read Full Paper →GUIDEIn ProgressApr 2026
Kali Linux: Practitioner's Field Guide
A hands-on reference covering installation, tool configuration, network reconnaissance, exploitation workflows, and post-engagement reporting.
#Kali Linux#Penetration Testing#Security#Reconnaissance#Metasploit
Read Full Paper →