Kayvon Karimi ← Back to Portfolio

Projects Gallery

Comprehensive collection of cybersecurity assessments, penetration tests, system hardening, software development, and technical demonstrations

Network Security & Exploitation

Wi-Fi Capture & WPA2 Key Cracking

Implemented monitor mode with packet injection to capture and decrypt WPA2 traffic. Analyzed SSDP/UPnP and HTTP flows with device-scoped filters in Wireshark. Comprehensive network traffic analysis demonstration.

Wireshark Kali Linux WPA2 Aircrack-ng Airmon-ng IE 802.11

TLS Key Logging in Windows with Wireshark

Tutorial demonstrating how to set up the SSLKEYLOGFILE environment variable on Windows to capture TLS session keys for HTTPS decryption in Wireshark. Essential technique for network analysis, debugging, and ethical penetration testing.

Wireshark TLS/SSL Windows HTTPS Decryption
INTERNAL NETWORK SMBv1 RDP AD CRITICAL VULNERABILITIES PENETRATION TEST

Design World – Internal Penetration Test

Identified critical SMBv1 vulnerabilities and weak SSL cipher suites. Assessed Active Directory exposure and RDP security posture. Comprehensive internal network security assessment with exploit validation.

Metasploit Active Directory SMB RDP
S 🐽 SPLUNK SIEM & SNORT IDS ANALYSIS SNORT ALERTS 1,847 EVENTS INDEXED 98.2K VERIFIED THREATS 47 INTRUSION DETECTION EVENTS: ⚠ PORT SCAN DETECTED: 192.168.1.45 → 192.168.1.100 ⚠ SQL INJECTION ATTEMPT: /api/users?id=1' OR '1'='1 ⚠ MALICIOUS PAYLOAD: Suspicious executable detected SPLUNK + SNORT Security Information & Event Management • Intrusion Detection System

Splunk Analysis & Snort Event Verification

Integrated Snort IDS alerts with Splunk SIEM for comprehensive network security monitoring. Analyzed intrusion detection events, correlated threat indicators across log sources, and verified security incidents using SPL queries and custom dashboards for real-time threat detection.

Splunk Snort IDS SIEM Log Analysis Intrusion Detection SPL

Web Application Security

Layer 1: Infrastructure Layer 2: IDS Layer 3: WAF APP WEB APPLICATION HARDENING WordPress + WooCommerce Multi-Layer Defense 5M+ IPs Blocked IDS/IPS/WAF Implemented OWASP Top 10

Web Application Security Hardening

Multi-layer defense architecture for WordPress/WooCommerce platform. Detected and blocked 5+ active threat sources, implemented IDS/IPS/WAF (Wordfence), geographic IP blocking (5M+ IPs), Apache hardening, and 24/7 automated monitoring achieving OWASP Top 10 compliance.

WordPress Wordfence WAF IDS/IPS Apache OWASP Top 10 Threat Intelligence
COURT CRATE Security Assessment ⚠ CRITICAL FINDINGS

Court Crate – E-commerce Vulnerability Assessment

Comprehensive security assessment of e-commerce platform. Scanned and enumerated endpoints using industry-standard tools, mapped vulnerabilities to ASVS framework, and provided detailed remediation recommendations.

Nmap Nikto Nessus ASVS
https://designworld.com ! WEAK TLS INSECURE HEADERS DESIGN WORLD Web Application Assessment

Design World – Web App Vulnerability Assessment

Comprehensive route enumeration and access control testing. Detected insecure HTTP headers and weak TLS configuration. Utilized fuzzing tools for endpoint discovery and security analysis.

FFUF Gobuster Burp Suite SSL/TLS
SECURITY HARDENING Enterprise Infrastructure Defense 0 Critical NIST/CIS Compliant Win/Linux CYBR-516

Enterprise Security Hardening & Infrastructure Defense

Achieved zero critical vulnerabilities through enterprise infrastructure hardening. Eliminated EternalBlue, weak SSL ciphers, and RDP exposure using NIST/CIS controls.

NIST 800-53 CIS Benchmarks Windows Hardening Linux Security Nessus Vulnerability Management

Application Development & Security Tools

GhostTrack Analytics - Privacy-First Analytics Platform

Privacy-focused web analytics platform with built-in security monitoring. Features real-time event tracking, bot detection, IP geolocation lookup, and threat analysis. Designed as a secure alternative to traditional analytics platforms with emphasis on data privacy and security.

Python Flask JavaScript SQLite Security Monitoring Analytics
from selenium import webdriver driver = webdriver.Chrome() driver.get("https://example.com") element = driver.find_element() element.click() 🐍 SELENIUM AUTOMATION 🤖 Python WebDriver Automation

Automating Browser Tasks with Selenium (Python)

Browser automation and testing framework using Selenium WebDriver and Python. Built automation scripts for web scraping, testing workflows, and repetitive task optimization. Implements efficient browser interaction patterns for quality assurance and data extraction.

Python Selenium Web Automation Testing WebDriver
WordPress Plugin Dashboard

Custom WordPress Plugin Development & Integration

Custom WordPress plugin for GhostTrack Analytics with WooCommerce integration. Features admin dashboard integration, one-click installation, automated tracking snippet injection, and REST API endpoints for real-time analytics synchronization.

PHP WordPress Plugin Development WooCommerce JavaScript REST API

Cloud & Infrastructure Security

AWS EC2 Pi-hole WireGuard VPN SERVER

VPN Server Setup with AWS, Pi-hole & PiVPN

Configured secure VPN server using AWS EC2 infrastructure. Implemented DNS-level ad blocking with Pi-hole and encrypted remote access via WireGuard for privacy protection and secure connectivity.

AWS EC2 Pi-hole PiVPN WireGuard
WAZUH SIEM Security Events ✓ Authentication Success ⚠ Failed Login Attempt ✓ VPN Connection Alert Dashboard 87% System Health Real-time Monitoring Active

Wazuh SIEM Implementation & Configuration

Deployed Wazuh SIEM on AWS with Pi-hole and WireGuard integration. Configured real-time security monitoring, custom detection rules, and automated alerting for comprehensive threat detection and incident response.

Wazuh AWS SIEM Security Monitoring
NMAP TARGET HOST SERVER $ nmap -sV -sC 192.168.1.0/24 PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https Scan complete: 3 hosts up ▶ VIDEO

Nmap - Network Scanning & Enumeration

Complete demonstration of Nmap network scanning techniques including host discovery, port scanning, service detection, and OS fingerprinting. Covers advanced scanning strategies and stealth techniques for security assessments.

Nmap Network Scanning Service Detection Enumeration
METASPLOIT Framework msf6 > use exploit/windows/smb/ms17_010_eternalblue EXPLOIT MODULE Name: EternalBlue Platform: Windows Rank: Average ⚠ CVE-2017-0144 ✓ Payload: windows/x64/ meterpreter/reverse_tcp ✓ Target: 192.168.1.100 EXECUTION [*] Started reverse TCP [*] Connecting to target [+] Target vulnerable! [*] Sending exploit... [*] Meterpreter session [+] EXPLOIT SUCCESS SHELL OBTAINED ▶ VIDEO

Metasploit Framework - Exploitation Demo

Step-by-step exploitation demonstration using Metasploit Framework. Covers vulnerability scanning, payload generation, exploitation techniques, and post-exploitation activities in a controlled lab environment.

Metasploit Exploitation Penetration Testing Post-Exploitation

System Security & Physical Access

Bypassing Kali Linux Login Via GRUB

Demonstrates GRUB bootloader exploitation to bypass user authentication and gain root shell access. Modifies boot parameters to reset account passwords without original credentials, highlighting the critical importance of physical security and full disk encryption.

GRUB Kali Linux Physical Security Boot Exploitation
ZIP $ john --wordlist=rockyou.txt protected.zip [*] Password found: ************ PASSWORD CRACKING ⚠ BRUTE FORCE ATTACK ▶ VIDEO

Zip Password Cracking with John the Ripper

Demonstrates password cracking techniques using John the Ripper on password-protected ZIP archives. Covers dictionary attacks, brute force methods, and hash extraction using zip2john for forensic analysis and penetration testing scenarios.

John the Ripper Kali Linux Password Cracking zip2john
010 110 AUTOPSY Digital Forensic Analysis 🔍 EVIDENCE RECOVERY

Forensic Analysis with Autopsy - System Artifact Recovery

Comprehensive digital forensic investigation using Autopsy to recover deleted artifacts from compromised systems. Analyzed system logs, registry data, and file metadata for evidence collection. Demonstrated forensic techniques for incident response and criminal investigations.

Autopsy Digital Forensics Evidence Collection Registry Analysis Incident Response

Web Development & Design

COURT CRATE Shop Now

Court Crate - E-Commerce Platform

Full-stack e-commerce platform for tennis equipment and gear. Features product catalog, shopping cart, user authentication, and secure checkout system with modern responsive design.

React Node.js MongoDB Stripe API
KAYVON TENNIS Elite Coaching | Former D1 Book a Lesson

Kayvon Tennis - Coaching Portfolio

Professional tennis coaching website featuring video tutorials, training programs, scheduling system, and client testimonials. Responsive design with integrated booking calendar and social media links.

HTML5 CSS3 JavaScript Responsive
PORTFOLIO

Cybersecurity Portfolio - Personal Website

Modern cybersecurity portfolio showcasing projects, skills, and professional experience. Features interactive project gallery, detailed case studies, and integrated contact system with responsive design.

HTML5 CSS3 JavaScript UI/UX
CYBER CYBER GLITCHES GLITCHES > CYBERSECURITY SOLUTIONS > PROTECTING DIGITAL ASSETS_

Cyber Glitches - Cybersecurity Firm

Professional cybersecurity consulting firm website offering penetration testing, vulnerability assessments, and security solutions. Features effects and secure client portal integration.

HTML5 CSS3 JavaScript Animations
Code Canvas Web Design, Done Right Professional • Responsive • Fast

CodeCanvas - Web Design Business

Professional web design and development business landing page featuring clean modern design, service showcase, portfolio gallery, transparent pricing tiers, and integrated contact system. Fiverr-inspired aesthetic with responsive mobile-first approach.

HTML5 CSS3 JavaScript Responsive
Rally IQ 🔒 Secure Tennis Coaching Vault 🎾

RallyIQ - Tennis Coaching Platform

Secure, organized platform for tennis coaches to store, track, and share coaching content. Features video upload and analysis, private content library, progress tracking, and bank-level security for protecting coaching materials and player data.

React Node.js Video Processing Cloud Storage

Academic Projects & Research

PROTECTING PANDAS Cryptography & IoT Security Research 🔒 AES Encryption | 🛡️ RFID Security CYBR-504

Protecting Pandas - IoT Security & Cryptography

Comprehensive cryptography research project addressing wildlife tracking system vulnerabilities. Implemented AES encryption for RFID sensors, designed traffic analysis countermeasures, and developed insider risk mitigation strategies for protecting endangered pandas from poachers.

Cryptography AES Encryption RFID Security IoT
ATTACKER 🐳 TARGET 🖥️ SYN SYN SYN SYN SYN ATTACK METRICS Packets/sec: 10,000+ State: SYN_RECV SYN FLOOD Docker Network Attack Simulation 🐳 Docker Environment ⚠️ DoS Attack

Docker-Based SYN Flood Attack Simulation

Academic research project demonstrating TCP SYN flood denial-of-service attacks in an isolated Docker environment. Implemented containerized attacker and target systems to analyze network flooding techniques, TCP handshake exploitation, and DoS mitigation strategies for educational purposes.

Docker Network Security SYN Flood TCP/IP DoS Attack Python
SIEM THREAT HUNTING DASHBOARD CRITICAL ALERTS 247 SUSPICIOUS EVENTS 1,832 LOGS ANALYZED 45K THREAT INDICATORS DETECTED: ● Failed Login Attempts: 1,247 ● Unusual Network Traffic: 89 ● Malware Signatures: 34 ● Privilege Escalations: 12 ● Blocked Threats: 2,891 ● Active Hunts: 7 THREAT HUNTING Security Information & Event Management 🔍 SIEM Platform 📊 Log Analysis

Threat Hunting with SIEM Technologies

Academic security operations project focused on proactive threat detection using Security Information and Event Management systems. Analyzed large-scale security logs, developed custom detection rules, investigated suspicious activities, and implemented threat hunting methodologies to identify and mitigate advanced persistent threats.

SIEM Threat Hunting Log Analysis SOC Operations Incident Response Security Monitoring