Projects
Honeypot Submission Portal — “Bug in My Eye” (IT Consulting Platform)
HTML,CSS, Claude, Formspree | GitHub
- For this project, I designed and developed a honeypot submission portal hosted at Bugr eyed Technologies (click Button at top of page) built to safely collect and analyze suspicious user submissions. The goal was to allow individuals and organizations to report potential security issues or anomalies so I could assess them and provide personalized IT consulting support. Using Formspree for backend form handling, I built a seamless and safe submission process without storing sensitive data directly on the client side. This ensures privacy, data integrity, and ease of integration within a static GitHub Pages environment. The honeypot component helps identify malicious patterns while providing real-world examples for analysis and client education.
Website creation for a portfolio.
HTML,CSS,JavaScript | GitHub
- Developed a responsive personal portfolio to showcase technical skills and projects. Built using HTML, CSS and JavaScript, with a focus on clean UI design, mobile responsiveness and performance optimization, leveraged AI tools such as ClaudeAI and Github Copilot to assist with content generation, layout design and code efficiency. This Project highlights front-end development skills, modern design practices, and the practical integration of AI-assisted development into the web creation process.
Consent based Phishing awareness campaign
gophish, Kali Linux | Personal Project, Loi Liang Yang
- Conducted an ethical, consent-based phishing simulation using GoPhish to evaluate user awareness and response to potential phishing threats. The campaign was performed entirely in a controlled environment with participants who voluntarily agreed to take part. The purpose was to identify areas for improvement in cybersecurity awareness and to enhance the organizations defensive posture through data-driven insights.
Verifying two Virtual Machines Connection
Virtualkization, Kali Linux | CIAT
- The first step in setting up the lab environment is installing the DEVASC-LAB virtual machine on VirtualBox. To begin, the DEVASC-LAB image must be downloaded from Cisco's official resources. Once the download is complete, VirtualBox is used to import the appliance. This is done by selecting the "Import Appliance" option and choosing the .ova file for the DEVASC-LAB. During the import process, it is important to review and adjust settings such as the amount of memory and number of CPUs allocated to the VM to ensure optimal performance. After the appliance has been successfully imported, the VM can be started to verify that it boots correctly and is ready for use.
- Following the installation of the DEVASC-LAB VM, the next task is to install the CSR1000v virtual machine. Unlike the DEVASC-LAB, the CSR1000v often requires a more manual setup process. After downloading the CSR1000v image from Cisco, a new virtual machine must be created in VirtualBox. During the creation process, the operating system type should be set to "Linux" and the version should be selected as "Other Linux (64-bit)." Adequate system resources must be allocated, typically including at least 4 GB of RAM and multiple CPU cores. The downloaded CSR1000v disk image, whether ISO or VHD format, must then be attached to the new VM's storage settings. Once configured, the VM can be started, and any required initial setup steps for the CSR1000v router can be completed
- After both virtual machines have been installed and started, it is necessary to verify communication between them. To accomplish this, both VMs must be connected to the same VirtualBox network, such as an internal network or a host-only adapter. Once network settings are properly configured, the DEVASC-LAB VM can be used to initiate a ping to the IP address of the CSR1000v VM. Receiving successful ping replies confirms that the two machines can communicate effectively, completing the basic setup process.
Exploring and modifying Linux boot process
Python, BeautifulSoup, Requests | Personal Project
- I Logged into the Virtual Machine, Opened the Terminal to modify GRUB Settings: Edit the /etc/default/grub file using sudo vi /etc/default/grub. Changed the GRUB_TIMEOUT=5 to GRUB_TIMEOUT=30. Updated the GRUB Configuration by running sudo grub2-mkconfig -o /boot/grub2/grub.cfg to apply changes. Reboot the System, Reboot with sudo reboot. If the GRUB menu doesn't appear, hold the left shift key during boot. Enter Single User Mode When GRUB menu appears, press e to edit. Add single after the word "quiet" in the "linux" line. Press Ctrl-x to boot into single-user mode. Verify Root Access: Enter the root password when prompted. Confirm root login with id and check the run level with runlevel. Continue Booting: Press Ctrl-d to continue booting normally.
Kali Linux Live Boot with Persistence Creation
Python, BeautifulSoup, Requests | Personal Project
- I created a Kali Linux live boot with persistence using Rufus to set up a portable and customizable penetration testing environment. This involved using Rufus to create a bootable USB drive with Kali Linux, configuring a persistent storage partition to retain data across reboots, and ensuring proper bootloader settings for persistence. The process also included partitioning the drive, editing configuration files, and testing the setup to verify that changes, such as installed tools or files, would persist after restarting. The project combined skills in Linux system administration, partition management, and cybersecurity best practices.