Michael Shoemaker

Web developer building accessible, performant sites.

View projects

About

Aspiring cybersecurity analyst and developer with proficiency in Linux distributions including Kali and Parrot. Passionate about security research and building secure, accessible web applications.

Skills

Offensive Security

Hands-on experience with penetration testing methodologies, vulnerability assessment, and exploit discovery using Kali and related tools.

Click for details

Offensive Security

  • Network & web app penetration testing
  • Vulnerability scanning & exploitation
  • Social engineering techniques
  • Metasploit, Burp Suite, Nmap proficiency
  • OSINT gathering & reconnaissance
Click to go back

Defensive Security

Threat hunting, intrusion detection, log analysis, and implementing network and endpoint protections to reduce attack surface.

Click for details

Defensive Security

  • SIEM configuration & log analysis
  • Incident response & forensics
  • Network security monitoring
  • Firewall & IDS/IPS management
  • Security hardening & patch management
Click to go back

Cloud Infrastructure Security

Knowledge of securing cloud workloads, IAM best practices, network segmentation, and hardening cloud services across providers.

Click for details

Cloud Infrastructure Security

  • AWS, Azure, GCP security configurations
  • IAM roles & least privilege access
  • Cloud compliance & governance
  • Container security (Docker, Kubernetes)
  • Infrastructure as Code security
Click to go back

Application Security

Secure coding practices, static/dynamic analysis, and remediation of common vulnerabilities in web applications.

Click for details

Application Security

  • OWASP Top 10 vulnerability remediation
  • Secure code review & SAST/DAST tools
  • API security & authentication
  • Input validation & sanitization
  • Security testing integration in CI/CD
Click to go back

Projects

Password Cracker Demo

Interactive educational demonstration of password cracking techniques including dictionary attacks, brute force, and rainbow table simulations.

View Demo Click for technical details

Technical Overview

  • Tech Stack: Vanilla JavaScript, HTML5, CSS3
  • Features: Real-time attack simulation with visual feedback
  • Techniques: Dictionary, brute force, rainbow tables
  • Performance: Optimized hashing algorithms
  • Education: Interactive learning tool for security concepts
View Demo Click to go back

Contact

Email: [email protected]