[root@kali ~]$ cat /proc/operator/identity┌─────────────────────────────────────────────────────────────┐
│ handle : Ermand Mani │
│ location : Glasgow, Scotland ████████ [OPSEC] │
│ clearance : BEng (Hons) Cyber Security — UWS 2026 │
│ platforms : Kali Linux | Tails OS | Ubuntu Server │
├─────────────────────────────────────────────────────────────┤
│ RESEARCH : SmartGuard — DeFi Fraud Detection │
│ CONFERENCE : SIGiST 2026, London [ACCEPTED] │
│ PRECISION : 100% | RECALL: 100% | F1: 100% │
│ AUDIT MATCH : BlockSec STRATOS-2024-001 [CORROBORATED] │
├─────────────────────────────────────────────────────────────┤
│ SEEKING : SOC | Pentest | DFIR | AppSec | Blockchain │
│ STATUS : OPEN TO HIRE >>> hi@ermand.uk │
└─────────────────────────────────────────────────────────────┘
[root@kali ~]$ cat /etc/tools/arsenal.conf[*] OPERATING SYSTEMS ──────────────────────────────────────
├── Kali Linux offensive security platform
├── Tails OS anonymous ops — everything through Tor
└── Ubuntu Server lab infrastructure
[*] OFFENSIVE ──────────────────────────────────────────────
├── Burp Suite SQLi · XSS · CSRF · 2FA bypass
├── Metasploit exploitation framework
├── Ettercap ARP poisoning · MITM
├── Nmap host discovery · port scanning
└── Wireshark deep packet inspection
[*] SIEM & DETECTION ───────────────────────────────────────
├── Wazuh SIEM · HIDS · log correlation
├── Snort IDS · custom rule authoring
├── Arpwatch ARP change detection
└── OSSEC v3.7 host intrusion detection
[*] NETWORK SECURITY ───────────────────────────────────────
├── OpenVPN 2.4 PKI · EasyRSA · X.509 certs
├── FreeRADIUS 3.0 AAA · 802.1X · RADIUS protocol
├── GRE Tunnelling L2/L3 · Linux kernel + OVS
└── iptables TEE traffic mirroring for NIDS
[*] BLOCKCHAIN SECURITY ────────────────────────────────────
├── Slither 0.11.5 smart contract static analysis
├── SmartGuard 3x custom DeFi fraud detectors
├── Solidity 0.8 AST analysis · taint tracking
└── DeFi Taxonomy rug pulls · honeypots · flash loans
[*] DIGITAL FORENSICS ──────────────────────────────────────
├── Autopsy 4.21 disk forensics · artefact recovery
├── Volatility 2.6 memory forensics · malware detection
├── FTK Imager E01 imaging · hash verification
└── RegRipper 3.0 registry hive analysis
[*] LANGUAGES ──────────────────────────────────────────────
├── Python 3.10 detectors · pipelines · automation
├── Rust memory-safe systems (no UAF, no BOF)
├── C++17 SEI CERT secure coding
├── Bash/PowerShell scripting · recon · automation
└── Solidity smart contract vulnerability research
[root@kali ~]$ ls -la /ops/missions/drwxr-xr-x [BLOCKCHAIN] SmartGuard/ Slither DeFi fraud detector · 100% F1 · SIGiST 2026
drwxr-xr-x [DFIR] Operation-FishNet/ ACPO forensics · DarkComet RAT · 50+ court exhibits
drwxr-xr-x [OFFENSIVE] OWASP-Pentest-Suite/ SQLi · XSS · CSRF · 2FA bypass · 89/100
drwxr-xr-x [NETWORK] Network-Security/ ARP poison · Snort IDS · OpenVPN · RADIUS · A2
drwxr-xr-x [SECURE-CODE] Secure-Programming/ SEI CERT C++ · Rust Hangman · DCL50 STR50 MEM51
drwxr-xr-x [PYTHON] Programming-for-Cyber/ HTTP brute force · DNS pipeline · HIBP API
| Mission | Objective | Stack |
|---|---|---|
| 🔐 SmartGuard | DeFi fraud detector — 100% F1 — SIGiST 2026 | Python · Slither · Solidity |
| 🕵️ Operation FishNet | ACPO DFIR — DarkComet RAT — 50+ exhibits | Autopsy · Volatility · FTK |
| 💉 OWASP Pentest Suite | SQLi · XSS · CSRF · 2FA bypass — 89/100 | Burp Suite · Python |
| 🌐 Network Security | ARP poison · Snort · OpenVPN · RADIUS — A2 | Ettercap · Snort · FreeRADIUS |
| 🔒 Secure Programming | SEI CERT C++ remediation + Rust | C++17 · Rust |
| 🐍 Python Security Tools | HTTP brute force · DNS pipeline | Python · Sockets |
[wazuh@siem ~]$ tail -f /var/ossec/logs/alerts/ops.log** Alert 2026.04.17 11:42:03 UTC
Rule 9001 (level 15) -> DISSERTATION SUBMITTED
SmartGuard v1.0 — BEng Cyber Security — UWS
Result: PASS
** Alert 2026.03.12 09:15:44 UTC
Rule 9002 (level 15) -> PAPER ACCEPTED: SIGiST 2026 LONDON
SmartGuard: DeFi fraud detection via static analysis
Precision: 100% | Recall: 100% | F1: 100%
** Alert 2025.12.22 14:33:21 UTC
Rule 9003 (level 13) -> DFIR INVESTIGATION COMPLETE
DarkComet RAT identified via Volatility malfind plugin
ACPO 2012 compliant — 50+ court exhibits — CoC maintained
** Alert 2025.11.30 16:08:55 UTC
Rule 9004 (level 10) -> GRADE: A2 FIRST CLASS
Network Security COMP10014 — 80-89%
Labs: ARP Poison · Snort IDS · GRE · OpenVPN · RADIUS
** Alert 2025.05.01 10:22:17 UTC
Rule 9005 (level 10) -> PENTEST ASSESSMENT: 89/100
2FA bypass via SQLi · stored XSS session hijack · CSRF
Targets: Juice Shop · Mutillidae · Security Shepherd
[root@kali ~]$ ./recon.py --target self --verbose[root@kali ~]$ cat /etc/legal/disclaimer.txt
All operations conducted exclusively in authorised academic
lab environments. No real systems were targeted.
[root@kali ~]$ ./connect.sh --operator "Ermand Mani"
[+] Initialising secure channel...
[+] linkedin >> linkedin.com/in/ermandmani
[+] email >> hi@ermand.uk
[+] web >> ermand.uk
[+] Status >> OPEN TO HIRE — actively seeking roles
[+] Done.
[root@kali ~]$ █
