Wilson Elan Oluwasemiloore Self-taught cybersecurity analyst documenting hands-on security work across offensive and defensive domains.
This repo contains the tools, scripts, and portfolio documentation from my hands-on cybersecurity journey. Every project here was built, tested, and documented from scratch — with an emphasis on understanding the why behind each technique, not just running tools.
My work spans both sides of the kill chain: custom security tooling, manual penetration testing, OS hardening, network traffic analysis, and defensive security operations.
Albion Harden Script For Linux
A multi-distro Linux hardening framework with a full terminal GUI (whiptail). Scans the host, produces a scored security posture report, and applies hardening at four configurable levels.
Features:
- Auto-detects distro and package manager (Debian / Ubuntu / Kali / Arch / Fedora)
- Scores your security posture out of 100 with risk classification
- Four hardening levels: Decent, Advanced, Secured, Custom
- Modules: UFW/firewalld, SSH hardening, sysctl kernel tweaks, MAC randomisation, fail2ban, rkhunter, auditd, password policy, auto-updates
- Full ASCII branding, colour-coded output, timestamped log file
How to run:
chmod +x albion_hardener.sh
sudo TERM=xterm bash albion_hardener.shNote: Use
TABto navigate between buttons andENTERto confirm. If running over SSH, prefix withsudo TERM=xtermas shown above.
PortScanner.sh
A multi-threaded Python port scanner built for Blue Team defenders. Scans all 65,535 TCP ports, cross-references findings against a built-in port intelligence database, and provides risk classifications with OS-level remediation guidance.
Features:
- Full 65,535 TCP port scan with thread throttling
- Risk classification: CRITICAL / HIGH / MEDIUM / INFO
- Built-in remediation commands for 25+ known dangerous ports
- Zero dependencies — Python standard library only
- Colour-coded terminal output with summary report
How to run:
python3 port_scanner.py <target-ip>
⚠️ Only scan systems you own or have written authorisation to test.
Resources:
The full portfolio with writeups, evidence, and documentation for all projects is in Portfolio.md.
| Project | Category | Link |
|---|---|---|
| Custom Python Port Scanner | Blue Team Tool | View |
| Albion Hardener v2.0 | OS Hardening / DevSecOps | View |
| Web Application Penetration Testing Series | Offensive Security | Google Drive |
| Password Security & Hash Recovery Analysis | Forensics / Offensive | Google Drive |
| Network Traffic Analysis & Threat Detection | Defensive Security | Google Drive |
| Vulnerability Assessment & Remediation | Vulnerability Management | Google Drive |
| Advanced Nmap Firewall Evasion | Network Security Research | Google Drive |
Offensive → Penetration testing, web & API security, manual exploitation,
hash cracking, firewall evasion, BOLA/BFLA, XSS, SQLi
Defensive → Log analysis, alert triage, pcap analysis, threat hunting,
OS hardening, firewall management, C2 detection
Tooling → Burp Suite, OWASP ZAP, Nmap, Nessus, Wireshark,
Metasploit, John the Ripper, Splunk, UFW, fail2ban
Programming → Python (socket, threading, CLI), Bash (automation, hardening)
API Security → OWASP API Top 10, authentication testing, Postman, curl
GRC → ISO/IEC 27001, PCI-DSS awareness, risk assessment,
technical report writing
| Certification | Issuer |
|---|---|
| CompTIA Security+ (SY0-701) | CompTIA |
| Certified Threat Intelligence & Governance Analyst (CTIGA) | — |
| Certified Red Team Operations Management (CRTOM) | — |
| Certified Cybersecurity Educator Professional (CCEP) | — |
| OWASP API Security Top 10 | APIsec University |
| API Penetration Testing | APIsec University |
| API Security Fundamentals | APIsec University |
| Advent in Cyber 2025 | TryHackMe |
| MCP Security Fundamentals | Microsoft |
| Building Security into AI | — |
Actively participating in CTF challenges and structured security labs focused on:
- Log analysis & SIEM investigation
- Network traffic inspection
- Incident detection & triage
- Web application exploitation
View lab evidence & writeups →
All tools and techniques documented in this repository are for authorised and educational use only. Only test systems you own or have explicit written permission to assess. Unauthorised scanning or exploitation is illegal.
Albion-MYDFIR — Wilson Elan Oluwasemiloore — Actively building in public