Skip to content

Publications

Papers & Guides

Security research, technical guides, and methodological write-ups. Content ranges from practitioner field notes to formal research papers.

ARCHITECTUREActiveApr 2026

MOD-OSINT — Architecture & Development Lifecycle

Complete architecture document for the MOD-OSINT entity intelligence platform. Covers the full 6-phase development lifecycle, team role structure, UML system diagrams, event-bus flowcharts, git branch strategy, handoff schema, context snapshot format, and annotated pseudocode. Phase 0 complete; Phase 1 (intelligence module layer) active.

#OSINT#Architecture#Python#Graph Database#FastAPI#MITRE ATT&CK
Open Interactive Document ↗
TOOL PORTALActiveApr 2026

Kali Tool Documentation Portal — Burp Suite CE & Bettercap

Interactive reference portal for two foundational Kali Linux tools. Burp Suite Community Edition: intercepting proxy, HTTP/S traffic inspection, Proxy/Repeater/Intruder/Decoder/Comparer module model, TLS trust architecture, and workflow documentation. Bettercap: session-based modular network inspection framework, caplet automation, module layer taxonomy, defensive indicators, and log normalization patterns. 44 searchable tabs with copy-enabled code blocks.

#Burp Suite#Bettercap#Kali Linux#Web Security#Network Inspection#Proxy
Open Interactive Document ↗
TOOL REFERENCEIn ProgressApr 2026

Kali Tool Reference — Burp Suite CE & Bettercap

A structured reference guide covering Burp Suite Community Edition and Bettercap — their architectures, module models, operational envelopes, defensive perspectives, and integration patterns within authorized security research workflows. Written for practitioners in the Cyber Forensics Training and MOD-OSINT research tracks.

#Burp Suite#Bettercap#Web Security#Network Analysis#Kali Linux#Proxy#Protocol Inspection
Read Full Paper →
RESEARCH PAPERIn ProgressApr 2026

Wireless Audit Pipeline: An Event-Driven 802.11 Security Assessment Framework

A modular, event-driven Python pipeline that automates 802.11 wireless security assessment — from raw frame capture through structured vulnerability scoring, graph visualization, attack vector recommendation, and formal report generation. Developed as cybersecurity research for CIT under University of Michigan-Flint supervision.

#802.11#Wireless Security#Python#Event-Driven Architecture#OSINT#Network Forensics#Kali Linux
Read Full Paper →
GUIDEIn ProgressApr 2026

Kali Linux: Practitioner's Field Guide

A hands-on reference covering installation, tool configuration, network reconnaissance, exploitation workflows, and post-engagement reporting.

#Kali Linux#Penetration Testing#Security#Reconnaissance#Metasploit
Read Full Paper →

On the roadmap

Q3 2026

NetHunter KOE: Kali on Everything

Technical deep-dive companion to the Research page KOE stub — kernel patches, app install matrices, and field notes.

Q4 2026

OSINT Entity Graph Methodology

Graph-theoretic approaches to open-source intelligence: node models, relationship inference, and Neo4j schemas.

2027

LLM-Assisted Forensics Pipelines

Integrating large language models into digital forensics workflows without compromising chain of custody.