alexander@github:~$ cat /etc/operator_profile
I break systems to understand them — and automate the parts humans shouldn’t repeat. to understand them — and automate the parts humans shouldn’t repeat.
• Web & Network Pentesting
• Recon Automation & Attack Surface Mapping
• ML-based Intrusion Detection (IoT / Network)
• Cloud Security (AWS) & Infrastructure Hardening
• Python Tooling for Security Engineering
- Automated end-to-end ML IDS pipeline
- 99.76% accuracy on IoT attack dataset
- Preprocessing → Training → Evaluation → Reporting
- Lightweight Suricata IDS cluster
- Custom signatures for controlled attacks
- Traffic replay + alert validation environment
- Multi-format parser
- Rule-based detections + burst analysis
- Flask dashboard (correlation, timelines, alerts)
- Async port scanning + CPE mapping
- NVD API CVE correlation
- Auto-generated vulnerability intelligence
- CIS-aligned hardening checks
- PAM & authentication policy audits
- No external dependencies
- Detects reverse shells, rogue services
- Process correlation
- JSON export for SIEM
A clean badge‑based stack — compact, visual, and relevant to your actual offensive security workflow.
> LinkedIn : linkedin.com/in/alexander-pb
> GitHub : github.com/Alexander-50
> TryHackMe: tryhackme.com/p/77mrx77
> Email : pbalexander69@gmail.com