Secure Engineering Projects

A collection of full-stack applications and security work. Focusing on the engineering and defense aspects of each project.

IDS Defense – SOC-Grade ML Intrusion Detection

Built an enterprise-grade IDS dashboard featuring real-time ML-powered anomaly detection, actionable SOC KPIs, and deep-inspection threat telemetry.

The Threat

Network security teams lack real-time visibility into complex attack vectors, often overwhelmed by raw logs without actionable insights or ML context.

Methodology

Implemented a hybrid detection engine using XGBoost for anomaly classification. Developed a high-frequency WebSocket streaming dashboard with Standalone Demo Mode fallback.

Result & Impact

Delivered a production-ready SOC interface with sub-10ms inference latency, providing instant forensic visibility into DDoS, SQLi, and Brute Force attacks.

Full-StackProduction
ML/AIHands-On
BackendProduction
CybersecurityHands-On

MailShield – AI-Powered Phishing Defense

Developed an automated phishing detection system utilizing heuristic analysis and real-time URL sandboxing to protect enterprise communication channels.

The Threat

High-velocity phishing attacks bypassing traditional spam filters, leading to credential theft and malware delivery within organizations.

Methodology

Integrated AI-driven heuristic analysis for URL classification. Implemented a real-time sandboxing environment for threat validation and automated remediation.

Result & Impact

Reduced phishing exposure by 85% through proactive URL blocking and delivered an automated remediation landing page for end-user education.

Full-StackProduction
AppSecApplied
AutomationPractical
PythonHands-On

MealRoute – Secure Logistics Platform

Production-style logistics system with secure authentication, RBAC, and real-time synchronization for food delivery operations.

The Threat

Unauthorized access risks and data leakage across multi-tenant delivery operations.

Methodology

Implemented secure auth flows, role-based dashboards, and encrypted data channels.

Result & Impact

Prevented unauthorized access to operational data and streamlined delivery management.

Full-StackProduction
BackendProduction
Secure SystemsApplied
FirebaseHands-On

Android Security – Insecure Storage & Network Analysis

Conducted deep-dive security research into Android application vulnerabilities, focusing on insecure data persistence and network communication flaws.

The Threat

Sensitive JWT tokens were stored in plain-text shared preferences, and lack of SSL pinning allowed for easy MITM interception of encrypted traffic.

Methodology

Performed static analysis with JADX/MobSF. Utilized Frida for dynamic runtime hooking to bypass SSL pinning and inspect binary data structures.

Result & Impact

Secured local storage using the Android Keystore system and implemented robust certificate pinning, eliminating local data theft vectors.

AppSecApplied
AndroidHands-On
APIsHands-On
Security ResearchHands-On

Web App Assessment & Risk Validation

Conducted structured security assessments to identify data exposure, authorization flaws, and access control weaknesses. Validated findings through controlled testing.

The Threat

Exposed API endpoints allowed Insecure Object Reference (IDOR) and weak session management, risking unauthorized multi-tenant data access.

Methodology

Manual intercept testing with Burp Suite for broken access control and session hijacks. Automated baseline scans with OWASP ZAP.

Result & Impact

Eliminated IDOR risks and stored XSS flaws by enforcing strict RBAC and server-side input validation across the API layer.

BackendProduction
AppSecApplied
APIsHands-On
OWASP ASVSHands-On