Research reports and academic writing from my coursework and independent study.
A comparative security analysis using Nikto and Wapiti web application vulnerability scanners against a test environment.
An analysis of heap overflow vulnerabilities, covering exploitation techniques and memory corruption in vulnerable applications.
An exploration of a known Internet Explorer 8 vulnerability, detailing the exploit chain and underlying browser memory handling flaws.
A technical report on Structured Exception Handler (SEH) overflow attacks, covering overwrite techniques and exploit mitigations.
An examination of social engineering attack vectors including phishing, pretexting, and psychological manipulation tactics used in real-world scenarios.