Security-minded systems builder working on telemetry, monitoring, defensive tooling, automation, and constrained AI-assisted workflows.
I build small, practical projects that sit between systems, security, and operational data.
My current direction is shaped around:
- Linux, networking, and core systems understanding
- detection-oriented security engineering
- telemetry, monitoring, and signal processing
- public-safe technical writing and sanitized security notes
- AI-assisted workflows with explicit human verification, scope boundaries, and no autonomous response claims
C++20 defensive log analysis CLI for Linux authentication logs.
- parses both legacy syslog and
journalctl --output=short-fullstyle input - normalizes authentication evidence before detection
- applies configurable rule-based detections
- emits deterministic Markdown and JSON reports
- includes CI, CodeQL, and repository hardening
A four-demo public repository for deterministic, reviewable, local file-based telemetry and detection workflows.
telemetry-window-demo: sliding-window telemetry analytics and rule-based alertsai-assisted-detection-demo: deterministic detection and grouping with constrained LLM summarizationrule-evaluation-and-dedup-demo: before/after dedup, cooldown behavior, and suppression reasonsconfig-change-investigation-demo: risky config changes with bounded evidence correlation- latest milestone:
v0.6.0 - reviewer packs:
ai-assisted-detection-demoandconfig-change-investigation-demo
Public, sanitized security write-ups from authorized labs and training platforms.
- focused on methodology, reasoning, and reusable patterns
- designed for safe publication instead of copy-paste exploitation
- organized as a maintainable public knowledge base
- includes publication boundaries and sanitization rules
- building finished defensive / telemetry-oriented tools
- strengthening Linux and networking depth
- improving public project presentation and documentation quality
- preparing an English-first technical portfolio for international applications
- clear scope over inflated claims
- reproducibility over demos that only work once
- defensive and public-safe by default
- documentation, testing, and repository hygiene matter
Most repositories here are learning-driven engineering artifacts: small enough to finish, structured enough to review, and honest about their boundaries.
- GitHub: @stacknil


