WAFPierce
Web & Cloud PentestingCLI & GUI WAF/CDN fingerprinting and bypass validation tool. Detects 17+ WAFs and 12+ CDNs, runs 35+ bypass techniques with baseline heuristics, outputs Markdown reports. Co-developed with Marwan Fayad.
Cybersecurity student • Security Engineering • Cloud Security • Security Analysis
$ whoami
Nazariy Buryak
$ age
18 Years Old
$ role
Cybersecurity Student > Security Engineering / Cloud Security / Security Analysis
$ location
Portlaoise, Ireland
$ studying_at
South East Technological University, Carlow
$ focus
- Working on open-source security tools development
- Security engineering & system hardening
- Security analytics & log analysis
- AWS infrastructure security
- GCP Security
- Networking security & troubleshooting
- Threat modeling & cloud hardening
Team Captain · Seasonal Competition
Cloud Infrastructure & DevOps Engineer
Summit Participant
General Operative
Select a specialisation to explore my tools, technologies, and competencies in that domain.
Clear and concise communication when collaborating on security projects, writing documentation, and presenting technical findings
Analytical and structured approach to troubleshooting system issues and resolving security challenges in dynamic environments
Active involvement in technical events and security communities to strengthen teamwork, knowledge sharing, and professional growth
Data-driven mindset for identifying root causes, optimizing scripts, and improving system reliability through precise testing
Maintains focus and composure when diagnosing complex issues or working under tight deadlines in security-critical scenarios
CLI & GUI WAF/CDN fingerprinting and bypass validation tool. Detects 17+ WAFs and 12+ CDNs, runs 35+ bypass techniques with baseline heuristics, outputs Markdown reports. Co-developed with Marwan Fayad.
TUI-based security and governance tool for AWS. Scans cloud infrastructure in real-time to identify "Ghost" resources (unused/shadow IT) and "Risk" assets (critical vulnerabilities), featuring a hexagonal architecture for multi-provider extensibility.
Specialized cloud security tool that hunts for "Shadow AI" — unauthorized AI/ML workloads running in your AWS environment.
Reads security logs to detect brute-force attempts, SQLmap-style scans, and attack patterns by IP, time, and frequency, generating statistical reports and charts.
CLI reconnaissance tool that probes targets, enumerates services and HTTP apps, inspects TLS, fingerprints web stacks, and emits machine-readable reports.
Serverless image analysis system that automatically detects and labels objects in uploaded images using AWS AI services.
Graphical moon landing simulation written entirely in Motorola 68000 Assembly, demonstrating low-level hardware control, custom rendering, and real-time physics.
Restricts intern access so they can manage only development EC2 instances while keeping production locked down, using custom JSON policies and tag-based permissions.
Async file upload tool for any S3-compatible storage using aiobotocore for high-performance parallel transfers.
Serverless text-to-speech conversion system that transforms study notes into portable audio files.
September 2024 – Present • South East Technological University, Carlow
September 2019 – May 2024 • Portlaoise College
My learning paths, and certifications can be found on my My TryHackMe Profile .