breach in firewall,
threats hiding in your email,
payloads infecting
This path isn’t just about security - it’s about the dance between chaos and control.
Cyber Mayhem 101 is my deep dive into the world of ethical hacking, digital forensics, and simulated
cyber warfare.
I explore the weapons and shields of modern cyber conflict - from packet sniffers and rogue scripts to
secure erasure tools and social deception.
Milk & Eel reappear here as misfit cyber agents, navigating virtual networks, sabotaged files, and
corrupted smoothie protocols.
Together we uncover how systems break - and how they can be hardened.
To be filled upon completion.
By the end of Cyber Mayhem 101, I will be fluent in the core mechanics of network and system
exploitation,
comfortable navigating packet captures, virtual labs, DNS hijacks, basic firewall logic, and malware
traces.
More importantly, I’ll have sharpened my intuition for how systems can fail—and how to secure them.
These are the seeds of a responsible hacker mindset and a vigilant digital defender.
Come and take a look at all my projects on Github:
Checks file hashes to demonstrate tamper detection.
Safe, toy virus replicates itself in a controlled folder.
A short Python program that deletes itself after execution, demonstrating post-execution cleanup behavior.
Uses hash + simple signature scan to flag suspicious files.
Analyzes simulated access logs for malicious behavior.
Turns obfuscated ASCII values into a readable string, simulating how forensic analysts might recover hidden data or CTF-style flags.
Live packet capture using Scapy in a safe VM.
Demonstrates a broken login flow, an exploit script, and a fixed SHA-256 hashed login system using JSON credentials.
Performs basic TCP connect scans and banner grabs.
Performs basic information gathering on a target host.
Validates file hashes to confirm file integrity.
Simulates system state checks and alerts when unexpected file changes are detected.
Redirects domains locally using /etc/hosts for testing.
Python script that applies logic to allow/deny fake packets.
Script that crafts a realistic but harmless phishing email.
Converts URLs to deceptive or encoded forms.
Removes hidden metadata from images and documents.
Secure deletion tool with overwrite and recovery test.
Demonstrates overwriting sectors in disk images.
Compares deleted files with recoverable content.