Academic Papers

Research reports and academic writing from my coursework and independent study.

Loading preview...
Cybersecurity
Nikto & Wapiti Analysis

A comparative security analysis using Nikto and Wapiti web application vulnerability scanners against a test environment.

Loading preview...
Exploit Dev
Heap Overflow Report

An analysis of heap overflow vulnerabilities, covering exploitation techniques and memory corruption in vulnerable applications.

Loading preview...
Exploit Dev
IE8 Exploit

An exploration of a known Internet Explorer 8 vulnerability, detailing the exploit chain and underlying browser memory handling flaws.

Loading preview...
Exploit Dev
SEH Overflow Report

A technical report on Structured Exception Handler (SEH) overflow attacks, covering overwrite techniques and exploit mitigations.

Loading preview...
Cybersecurity
Social Engineering Report

An examination of social engineering attack vectors including phishing, pretexting, and psychological manipulation tactics used in real-world scenarios.