Mike T.'s repositories
AI-Cybersecurity-Research
White-paper & talk covering benefits, risks, and mitigation frameworks for AI and LLMs in cybersecurity (NIST AI RMF, OWASP Top 10 for LLMs, MITRE ATLAS, real-world case studies)
Conti-Leak-Analysis
In-depth analysis of the Conti ransomware gang based on their leaked internal Jabber chat logs. Includes organizational structure, operational tactics, key actors, and negotiation strategies.
Cyber-Incident-Alert-Breach
Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.
Cyber-Risk-Management-Plan
A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.
Digital-Forensics-Labwork
A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.
LokiBot-Malware-Analysis
Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.
Malware-Classification-Qilin
Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.
Malware-Network-Analysis
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
QuickResources
I like to play with html, so I created a favorites list, never ending and not completely inclusive, of some of my favorite cyber resources.
ResearchAI
AI-powered document analysis tool for querying content across PDFs, Word files, Excel sheets, text files, and web URLs using Google’s Gemini API.
SimplePort
Python-based TCP port scanner with customizable ranges, service detection, real-time output, and timestamped logging — built for ethical security testing and training.
Static-Malware-Analysis
This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.
TrickBot-Analysis
In-depth malware research report analyzing TrickBot's evolution from a banking trojan to a modular threat tool used in ransomware campaigns. Covers threat actor attribution, MITRE ATT&CK mapping, propagation techniques, and defensive strategies.
course-highlights
Summary of key cybersecurity, programming, and digital forensics courses completed at Utica University as part of the B.S. in Cybersecurity (Cyber Operations). Highlights include AI security, OSINT, malware analysis, and applied risk management using NIST frameworks.