Portfolio

Began mentoring two students studying cyber security students for UNSWs CSESoc Industry Mentoring Program.
🎙How to Analyze Code for Vulnerabilities using Joern The team spoke to Vickie Li & Suchakra Sharma about the process of analyzing application code to find security vulnerabilities. In this episode,...
🎙Software Security at Rocketship Pace with Alex Rosenzweig We spoke to Alex about how in the age of DevOps the software delivery lifecycle is moving more rapidly than ever before. Which has broken ...
Pearl Memory Github A Python script for creating German Anki cards. The script loads a CSV file of words to search, gets a translation using Azure Cognitive Services translate and text to speech to...
Zenobia Github A KeePassXC database backup script that can be run, hourly, daily, monthly or yearly using cron.
USB Canary Github · Bleeping Computer Feature USB Canary is a Linux and OSX tool that uses psutil to monitor USB devices either around the clock, or just while your computer is locked. It can be co...
TIL: How to Create Multiple Endpoints in Azure Function with Golang
TIL: How to improve language detection using langdetect
Why We Should Remove Lazy From Our Vocabulary
TIL: How to include media in Anki cards using Genaki
Impressioning Tools for Beginners
Introduction to Threat Manager Studio
Creating a Honeytoken User in Office 365
Part 3: Creating a CI/CD Pipeline in Azure DevOps
Part 2: Advanced Configuration of Sphinx
Part 3: Identifying Cultural Threats and Risks
Part 1: Creating a Blog on Sphinx
A New Blog Built with Sphinx on Azure
Part 2: Why does Culture Hacking Matter?
Part 1: Culture Hacking
Contacting the Spirits in Multiple Dimensions with SSH Keys
Part I: Agloe, what the map makers-of the 1930s can teach us about protecting data in 2018
The Big Cloud Security Debate: Hackers vs Security Engineers Debate Recording A debate organised by ANZ, Contino and Meetup Madness where 4 hackers vs 4 security experts engaging in a fiery debate ...
A Brief History of Tamper Evident Locks Lockcon · View the Slides A talk that discussed common “canary locks” or locks with tamper evident mechanisms through the ages, Buffy trawled through 11,335,...
LUV May 2019 Main Meeting: Kali Linux Linux Users of Victoria Main Meetup Come together in ritual to learn about KALI LINUX! A Debian based Penetration Testing and Ethical Hacking distribution, wit...
Snake Charming for Beginners 0xCC · Course Work Snake-charming is an age-old practice of hypnotizing snakes by playing and waving a murli - in the modern day this practice looks much different, equ...
Agloe - What the Map Makers of the 1930s can Teach us About Protecting our Data in 2018 OWASP AppSec Day Melbourne What does the little town of Agloe, Colchester, NY have in common with modern day ...
Agloe - What the Map Makers of the 1930s can Teach us About Protecting our Data in 2018 PyCon Au 2018 - Security & Privacy Track What does the little town of Agloe, Colchester, NY have in common wi...
Building your own offline file-sharing and communication system for the inevitable downfall of the Internet Have you ever considered a world where the Internet in all it’s grandeur and tyre-fire-ne...
"Dear Rubyists… and any other web developers listening" Ruby on Rails Melbourne This presentation was about common web application vulnerabilities and how they can be remediated by developers.
🎙How to do Code Review - The Offensive Security Way We join Shubham Shah to learn how to leverage code review as part of the bug hunting process and find high and critical risk vulnerabilities in s...
🚀Just finished writing my conference talk for Pyconline 2021 & BSides Perth on "Collapsology: Why exposed RDP isn't your biggest threat" where we recount the rise and fall of empires and what they ...
🎙I recently had the pleasure of presenting my talk "Collapsology: Why exposed RDP isn't your biggest threat" at Pyconline 2021 & BSides Perth. In this talk, I recounted the rise and fall of empires...