# Exploring cutting-edge cybersecurity research, hardware hacking, and
# network security analysis tailored for the Durban and KZN region.
Pwnagotchi + Bjorn Cyberviking Hybrid
A sophisticated WiFi security research platform combining the AI-driven packet capture capabilities of Pwnagotchi with Bjorn Cyberviking's advanced wardriving features. Built on Raspberry Pi, this hybrid system autonomously hunts for WiFi networks, performs handshake captures, and analyzes wireless security postures in real-time.
./explore --project=ironside→Hardware Used + 3D Print Files
Everything we use, everything we play with, and everything we have created to make our research possible. From 3D print files to circuit diagrams, bill of materials to assembly instructions, find all the resources you need to replicate and build upon our hardware hacking projects.
./explore --project=hardware hybrid→WiFi Security Research in Durban
Comprehensive analysis of wireless security practices across Durban and KZN. This research examines WiFi encryption standards, common vulnerabilities, WPA2/WPA3 adoption rates, and physical security considerations for wireless networks in the region. Includes practical defensive strategies for SMEs.
./explore --project=wardriving→Secure Network Design for SMEs
Best practices for designing and implementing secure network architectures tailored for small-to-medium businesses. Covers VLAN segmentation, proper firewall placement, DMZ configuration, secure VPN implementations, and zero-trust principles using open-source tools like pfSense, VyOS, and WireGuard.
./explore --project=network architecture→Social Engineering Detection & Prevention
Advanced research into phishing attack vectors, email spoofing techniques, and behavioral analysis patterns. Includes development of automated phishing detection systems using machine learning, DMARC/SPF/DKIM implementation guides, and employee awareness training frameworks specifically designed for South African business contexts.
./explore --project=phishing defense→Embedded Device & Smart System Hardening
Investigation of vulnerabilities in IoT devices commonly deployed in KZN businesses - from smart cameras to building automation systems. Research covers firmware analysis, protocol exploitation (MQTT, CoAP), radio frequency attacks, and practical hardening strategies for resource-constrained embedded devices.
./explore --project=iot security→AWS, Azure & GCP Hardening Research
Comprehensive analysis of cloud misconfigurations and security best practices for major cloud providers. Focuses on IAM policies, storage bucket security, network segmentation in VPCs, serverless security, and cost-effective monitoring solutions using open-source tools like Prowler, CloudSploit, and ScoutSuite.
./explore --project=cloud security posture→Windows Domain Exploitation & Defense
Deep-dive into Active Directory attack paths, Kerberos exploitation techniques, and defensive strategies. Covers bloodhound analysis, golden ticket attacks, privilege escalation, and implementing tiered administration models. Includes practical guides for detecting and preventing common AD attacks in hybrid cloud environments.
./explore --project=active directory security→Log Analysis & Anomaly Detection
Building effective Security Information and Event Management systems using open-source platforms like ELK Stack, Wazuh, and Graylog. Research covers log normalization, correlation rules, threat intelligence integration, and developing custom detection rules for African-specific threat actors and attack patterns.
./explore --project=siem & threat hunting→Android & iOS Application Security Testing
Analysis of mobile application security vulnerabilities prevalent in South African banking, retail, and service apps. Covers static and dynamic analysis techniques, API security testing, certificate pinning bypass, root detection evasion, and secure development practices for mobile applications using tools like MobSF, Frida, and Objection.
./explore --project=mobile security→