What is Really Hidden? Discussing Instagram OSINT Tools
How Instagram OSINT tools and public profiles can reveal personal data to anyone who knows where to look.
How Instagram OSINT tools and public profiles can reveal personal data to anyone who knows where to look.
Bridging anime storytelling and cyber security concepts by analysing how Kenjaku’s impersonation and manipulation mirror real-world social engineering attacks.
Built industry readiness as a high-achieving IT student by actively engaging in conferences, university clubs, and tech communities.
Completed a cybersecurity simulation with ANZ, identifying threats through packet capture investigation using open-source tools.
A quick cheat sheet for those who are interested in putting their development skills to the test. This cheat sheet provides the preliminary steps in setting up and deploying a GitHub Pages portfolio that you can use to show off your work.
This writeup demonstrates how to exploit the Moniker Link vulnerability responsible for RCE and credential leak vulnerabilities.
A quick cheat sheet for those who are interested in putting their development skills to the test. This cheat sheet provides the preliminary steps in setting up and deploying a GitHub Pages portfolio that you can use to show off your work.
A job simulation exercise that involved reading web activity logs, supporting a client in a cybersecurity breach, and providing analytical, data-based conclusions to identify suspicious user activity.
Blending strong writing, analytical thinking, and an eye for detail to produce clear, actionable intelligence.
A personal reflection on what it means to learn, grow, and challenge fixed ideas of teachability.