└─$ cd /research && ls -la

Security Research Projects

# Exploring cutting-edge cybersecurity research, hardware hacking, and
# network security analysis tailored for the Durban and KZN region.

10Active Projects
100%Open Source
KZNRegion Focus
🤖

Ironside

Pwnagotchi + Bjorn Cyberviking Hybrid

└─$ ./ironside --mode=hybrid --target=wpa2|
[✓] Project loaded successfully

A sophisticated WiFi security research platform combining the AI-driven packet capture capabilities of Pwnagotchi with Bjorn Cyberviking's advanced wardriving features. Built on Raspberry Pi, this hybrid system autonomously hunts for WiFi networks, performs handshake captures, and analyzes wireless security postures in real-time.

Raspberry PiWiFi SecurityAI/MLHardware Hacking
./explore --project=ironside
🥽

Hardware Hybrid

Hardware Used + 3D Print Files

└─$ ./octoprint --file=enclosure.stl --target-temp=210 --bed-temp=60|
[✓] Project loaded successfully

Everything we use, everything we play with, and everything we have created to make our research possible. From 3D print files to circuit diagrams, bill of materials to assembly instructions, find all the resources you need to replicate and build upon our hardware hacking projects.

Raspberry Pi3D PrintingDIY BuildsOpen Source
./explore --project=hardware hybrid
📡

Wardriving

WiFi Security Research in Durban

└─$ ./wardrive --region=durban --scan=deep|
[✓] Project loaded successfully

Comprehensive analysis of wireless security practices across Durban and KZN. This research examines WiFi encryption standards, common vulnerabilities, WPA2/WPA3 adoption rates, and physical security considerations for wireless networks in the region. Includes practical defensive strategies for SMEs.

WiFi AnalysisWPA3Durban IoTSecurity Mapping
./explore --project=wardriving
🔒

Network Architecture

Secure Network Design for SMEs

└─$ ./netconfig --design=secure --tier=sme|
[✓] Project loaded successfully

Best practices for designing and implementing secure network architectures tailored for small-to-medium businesses. Covers VLAN segmentation, proper firewall placement, DMZ configuration, secure VPN implementations, and zero-trust principles using open-source tools like pfSense, VyOS, and WireGuard.

Network DesignVLANspfSenseZero Trust
./explore --project=network architecture
🎣

Phishing Defense

Social Engineering Detection & Prevention

└─$ ./phish-analyze --corpus=latest --ml=enabled|
[✓] Project loaded successfully

Advanced research into phishing attack vectors, email spoofing techniques, and behavioral analysis patterns. Includes development of automated phishing detection systems using machine learning, DMARC/SPF/DKIM implementation guides, and employee awareness training frameworks specifically designed for South African business contexts.

Social EngineeringEmail SecurityDMARCUser Training
./explore --project=phishing defense
🔐

IoT Security

Embedded Device & Smart System Hardening

└─$ ./iot-scan --protocol=all --extract=firmware|
[✓] Project loaded successfully

Investigation of vulnerabilities in IoT devices commonly deployed in KZN businesses - from smart cameras to building automation systems. Research covers firmware analysis, protocol exploitation (MQTT, CoAP), radio frequency attacks, and practical hardening strategies for resource-constrained embedded devices.

IoTFirmware AnalysisRF SecurityEmbedded Systems
./explore --project=iot security
☁️

Cloud Security Posture

AWS, Azure & GCP Hardening Research

└─$ ./cloud-audit --provider=multi --compliance=cis|
[✓] Project loaded successfully

Comprehensive analysis of cloud misconfigurations and security best practices for major cloud providers. Focuses on IAM policies, storage bucket security, network segmentation in VPCs, serverless security, and cost-effective monitoring solutions using open-source tools like Prowler, CloudSploit, and ScoutSuite.

Cloud SecurityAWSAzureIaC Security
./explore --project=cloud security posture
🛡️

Active Directory Security

Windows Domain Exploitation & Defense

└─$ ./ad-assess --domain=corp --bloodhound=enabled|
[✓] Project loaded successfully

Deep-dive into Active Directory attack paths, Kerberos exploitation techniques, and defensive strategies. Covers bloodhound analysis, golden ticket attacks, privilege escalation, and implementing tiered administration models. Includes practical guides for detecting and preventing common AD attacks in hybrid cloud environments.

Active DirectoryKerberosBloodHoundWindows Security
./explore --project=active directory security
🔍

SIEM & Threat Hunting

Log Analysis & Anomaly Detection

└─$ ./siem-deploy --stack=elk --rules=mitre-attck|
[✓] Project loaded successfully

Building effective Security Information and Event Management systems using open-source platforms like ELK Stack, Wazuh, and Graylog. Research covers log normalization, correlation rules, threat intelligence integration, and developing custom detection rules for African-specific threat actors and attack patterns.

SIEMELK StackThreat HuntingLog Analysis
./explore --project=siem & threat hunting
📱

Mobile Security

Android & iOS Application Security Testing

└─$ ./mobile-test --platform=both --dynamic=frida|
[✓] Project loaded successfully

Analysis of mobile application security vulnerabilities prevalent in South African banking, retail, and service apps. Covers static and dynamic analysis techniques, API security testing, certificate pinning bypass, root detection evasion, and secure development practices for mobile applications using tools like MobSF, Frida, and Objection.

Mobile SecurityAndroidiOSAPI Testing
./explore --project=mobile security

Interested in collaboration?

# We're always exploring new research areas and welcome partnerships

./contact --topic=research📬