WAFPierce
Web & Cloud PentestingCLI & GUI WAF/CDN fingerprinting and bypass validation tool. Detects 17+ WAFs and 12+ CDNs, runs 35+ bypass techniques with baseline heuristics, outputs Markdown reports. Co-developed with Marwan Fayad.
Cybersecurity student • Security Engineering • Cloud Security • Security Analysis
Team Captain · Seasonal Competition
Cloud Infrastructure & DevOps Engineer
Summit Participant
General Operative
Securing cloud infrastructure across AWS, GCP and Azure at scale.
Tools & Technologies
Key Focus Areas
Building, hardening and automating security tooling across systems.
Tools & Technologies
Key Focus Areas
Monitoring, detecting and responding to threats in real time.
Tools & Technologies
Key Focus Areas
Offensive security — finding and exploiting vulnerabilities before attackers do.
Tools & Technologies
Key Focus Areas
Embedding security into every stage of the development pipeline.
Tools & Technologies
Key Focus Areas
Clear and concise communication when collaborating on security projects, writing documentation, and presenting technical findings
Analytical and structured approach to troubleshooting system issues and resolving security challenges in dynamic environments
Active involvement in technical events and security communities to strengthen teamwork, knowledge sharing, and professional growth
Data-driven mindset for identifying root causes, optimizing scripts, and improving system reliability through precise testing
Maintains focus and composure when diagnosing complex issues or working under tight deadlines in security-critical scenarios
Experienced in leading teams through competitive CTF events, coordinating task delegation, and driving collaborative problem-solving under pressure
CLI & GUI WAF/CDN fingerprinting and bypass validation tool. Detects 17+ WAFs and 12+ CDNs, runs 35+ bypass techniques with baseline heuristics, outputs Markdown reports. Co-developed with Marwan Fayad.
TUI-based security and governance tool for AWS. Scans cloud infrastructure in real-time to identify "Ghost" resources (unused/shadow IT) and "Risk" assets (critical vulnerabilities), featuring a hexagonal architecture for multi-provider extensibility.
Specialized cloud security tool that hunts for "Shadow AI" — unauthorized AI/ML workloads running in your AWS environment.
Reads security logs to detect brute-force attempts, SQLmap-style scans, and attack patterns by IP, time, and frequency, generating statistical reports and charts.
CLI reconnaissance tool that probes targets, enumerates services and HTTP apps, inspects TLS, fingerprints web stacks, and emits machine-readable reports.
Serverless image analysis system that automatically detects and labels objects in uploaded images using AWS AI services.
Graphical moon landing simulation written entirely in Motorola 68000 Assembly, demonstrating low-level hardware control, custom rendering, and real-time physics.
Restricts intern access so they can manage only development EC2 instances while keeping production locked down, using custom JSON policies and tag-based permissions.
Async file upload tool for any S3-compatible storage using aiobotocore for high-performance parallel transfers.
Serverless text-to-speech conversion system that transforms study notes into portable audio files.
September 2024 – Present • South East Technological University, Carlow
September 2019 – May 2024 • Portlaoise College
The SecOps Group
ZeroDays CTF
Digital Cloud Training
TryHackMe
TryHackMe
TryHackMe