Security Researcher

Isaac.

Threat intelligence & honeypot operations
Honeypot active
Work
SSH Honeypot Operation Active
Cowrie SSH honeypot deployed on a cloud VPS, exposed on port 22 with hardened firewall rules and passive OS fingerprinting via p0f. Paired with a fake phpMyAdmin web honeypot behind a reverse proxy. Logs forwarded to Splunk Cloud for correlation and triage. Real-time alerting on high-confidence events.
2024 – now
3 campaigns
documented
Outlaw / mdrfckr Botnet Intel
Identified and tracked the Outlaw/mdrfckr botnet campaign through honeypot telemetry. Extracted C2 infrastructure indicators, submitted IOCs to ThreatFox, and filed abuse reports with relevant CERTs and hosting providers. Produced a formal threat intelligence report documenting TTPs.
2026
RedTail Cryptominer — Malware Analysis Analysis
Static analysis of UPX-packed RedTail samples (XMRig-based). Used Detect-It-Easy and string extraction to identify ANTIVM evasion logic. Submitted a novel SSH public key IOC — the first documented record of its kind on ThreatFox at time of submission.
2026
Novel IOC
submitted
Mirai LZRD Variant Intel
Captured exploitation attempts from a Mirai LZRD variant via honeypot. Extracted behavioural indicators, mapped activity to known Mirai campaign patterns, and submitted IOCs to ThreatFox.
2026
Self-Hosted DNS Infrastructure Infrastructure
Dual-node authoritative DNS deployment using Technitium on cloud servers. Cloudflare Workers and D1 for edge logic. Self-hosted notification relay for infrastructure alerting. WireGuard-based VPN with obfuscation layer for secure remote access.
2025 – 2026
Tools & methods
Detection
  • Cowrie SSH honeypot
  • Splunk Cloud
  • p0f fingerprinting
  • ntfy alerting
Analysis
  • Detect-It-Easy
  • VirusTotal
  • String extraction
  • Sandbox analysis
Infrastructure
  • Linux / iptables
  • nginx
  • Cloudflare Workers
  • WireGuard