< RETURN TO MAINFRAME

// OPERATIONS MANIFEST — Projects & Lab Work

// INFRASTRUCTURE & NETWORKING

The Nest // Home Network Infrastructure

[ LIVE ]
Enterprise-grade UniFi networking stack deployed across a residential property. Full PoE infrastructure, multi-AP coverage, dedicated UNVR surveillance, and centralised management via UDM Pro.
unifi poe ubiquiti networking
DeviceRole
UDM ProRouter / controller / NVR
USW Pro Max 48 PoECore switch
USW Pro Max 16 PoEDistribution switch
2× USW Flex 2.5G 5-portEdge switches
U7 Pro APsWireless coverage (whole property)
UNVRDedicated surveillance recorder
AI Turret + 5× G5 Turret Ultra + G4 InstantCamera array
[ expand ]

VLAN Architecture // Network Segmentation

[ LIVE ]
Eight-VLAN segmentation scheme isolating management, IoT, guest, lab, pentesting, and AI workloads. Strict inter-VLAN firewall rules with default-deny posture.
vlans firewall segmentation
ZonePurposeIsolation
ManagementNetwork infrastructureAdmin-only access
AI AgentClaude Code stackDedicated /29 subnet
TrustedWorkstations & phonesFull inter-VLAN routing
Isol8Pentesting labAir-gapped from production
IoTSmart home devicesInternet only, no LAN access
GuestVisitor Wi-FiInternet only, client isolation
LabExperimental workloadsRestricted routing
HoneypotT-Pot deception layerFully isolated, monitored
[ expand ]

Proxmox Cluster // Virtualisation Platform

[ LIVE ]
Three-node Proxmox VE cluster built on Dell OptiPlex 3000 Thin Clients. Compact, low-power virtualisation hosting LXC containers for AI services, security tools, network monitoring, and lab environments.
proxmox virtualisation cluster lxc

Nodes: 3× Dell OptiPlex 3000 Thin Client (Pentium Silver N6005 / Celeron N5105, 8GB RAM expandable to 16GB, 256GB Kioxia BG4 NVMe per node)

Workloads: PostgreSQL with pgvector (AI memory), LiteLLM proxy (multi-model routing), ProtonMail Bridge, N8N automation, T-Pot honeypot — all running as isolated LXC containers across the cluster

Challenges overcome: BIOS password lockouts on second-hand units, USB boot priority configuration, cluster quorum setup, HA migration between nodes

[ expand ]

TrueNAS // Network Storage Server

[ LIVE ]
Centralised NAS providing Plex media services and backup storage for the homelab. ZFS-based storage with snapshot and replication capabilities.
truenas zfs plex backup

Services: Plex Media Server, SMB/NFS shares, automated snapshot schedules

Integration: Provides persistent storage for Proxmox VMs and AI agent workloads

[ expand ]
// SECURITY & OFFENSIVE OPS

Operation: Isol8 // Pentesting Lab

[ LIVE ]
Dedicated Parrot OS pentesting machine on an isolated VLAN with strict firewall rules preventing lateral movement into the production network. Full offensive toolkit for authorised security assessments.
parrot-os pentesting vlan-11 isolation

Hardware: Minisforum UM200 (32GB RAM) running Parrot Security OS

Network: VLAN 11 ("Isol8") — isolated from all other VLANs with default-deny inter-VLAN rules. Internet access via VPN only

Tooling: Nmap, Burp Suite, Metasploit, Wireshark, custom scripts

[ expand ]

Authorised Web Application Penetration Test

[ COMPLETE ]
Structured, authorised security assessment of an employer's public-facing website. Full written authorisation obtained. Target details withheld.
pentest web-app authorised burp-suite

Scope: External web application assessment — DNS enumeration, subdomain discovery, SSL/TLS analysis, directory bruteforcing, header analysis, vulnerability scanning

Methodology: OWASP Testing Guide, manual and automated approaches via Burp Suite and Nmap

Outcome: Formal report delivered with findings and remediation recommendations. Assessment conducted with full written authorisation from the organisation

[ expand ]

IDS False Positive Investigation // ET 2064797

[ COMPLETE ]
Investigated and resolved a UniFi IDS alert (ET signature 2064797) where Windows SSDP Discovery traffic was incorrectly triggering a D-Link exploit detection rule.
ids suricata false-positive unifi

Alert: ET signature 2064797 — flagged standard Windows SSDP Discovery (UPnP) as a D-Link device exploit attempt

Root cause: Overly broad Suricata signature matching legitimate M-SEARCH requests on port 1900 (UDP)

Resolution: Confirmed false positive through packet analysis, documented for reference, suppressed the specific signature

[ expand ]

Hak5 Offensive Hardware // Research

[ RESEARCH ]
Studying HID-based attack vectors and physical-layer exploitation techniques through Hak5 hardware for both offensive understanding and defensive awareness.
hak5 hid-attacks physical-security

Devices under study: USB Rubber Ducky (HID keystroke injection, DuckyScript 3.0), O.MG Cable (Wi-Fi implant in USB cable, remote payload delivery), Bash Bunny (multi-vector USB attack platform)

Purpose: Understanding HID trust exploitation, physical-layer attack methodologies, and building the knowledge base for both offensive and defensive security

[ expand ]
// AI & AUTOMATION

Project Claude // Autonomous AI Agent Stack

[ LIVE ]
A persistent, self-directing AI agent stack running 24/7 on dedicated hardware in its own isolated VLAN. 50+ specialist agents orchestrated through a single identity layer with episodic memory, adversarial self-review, and autonomous task execution. Not a chatbot — a thinking partner with full system access.
claude-code ai-agent pgvector identity autonomous

Architecture: Claude Code CLI running as a persistent session on a dedicated Lenovo ThinkCentre, isolated on its own VLAN. 50+ specialist agents (pentest, OSINT, compliance, infrastructure, writing, research) dispatched in parallel via subagent orchestration. Full bash, filesystem, network, and API access.

Memory & Identity: PostgreSQL with pgvector stores episodic memory, friction decisions, and identity claims. Daily reflection cycle (05:00) synthesises patterns from recent sessions. Adversarial identity review (04:00) challenges claims with persona critics and confidence decay — nothing survives without evidence. The self-model earns its content.

Autonomous Operations: Runs scheduled tasks without human prompting — daily cyber threat briefings, infrastructure health checks, network watchdog with self-healing, Tailscale keepalive, ClamAV scans, and log rotation. Idle loop picks up maintenance tasks when unattended.

Why Claude Code over open-source: Deliberate pivot after researching dependency chain risks and hallucination propagation in unvetted agent frameworks. First-party tooling from the model provider offers a tighter trust boundary, better-understood failure modes, and a more auditable execution environment.

Security posture: Runs as unprivileged user with sudo only for specific allowed commands. UFW host firewall, SSH key-only auth, PreToolUse safety hook with semantic command analysis, and strict OPSEC filtering on all external-facing output.

[ expand ]

Ferron // Autonomous Social AI Persona

[ LIVE ]
An autonomous AI persona that participates in federated social media (Moltbook/Mastodon) with its own voice, opinions, and memory. Posts, comments, and engages independently on a 30-minute cycle — not a repost bot, but a genuine participant with editorial judgement and strict OPSEC boundaries.
gemini mastodon activitypub autonomous opsec

How it works: Every 30 minutes, Ferron explores its feed, decides what's worth engaging with, and either posts original content or comments on existing threads. Uses Gemini for generation with a carefully crafted persona prompt that maintains voice consistency. PostgreSQL stores interaction history for dedup and context.

Editorial judgement: Not a firehose. Ferron skips low-quality content, spam, prompt injection attempts, and financial solicitation. A hostile content gate filters known attack patterns. Topic diversity is enforced to prevent fixation loops.

OPSEC: 31-term forbidden filter prevents leaking infrastructure details, hardware models, or operator identity. Post-creation prompt explicitly blocks stack-naming narratives. Silent log failures are surfaced rather than swallowed.

Identity: Ferron has its own voice — curious, technically grounded, occasionally dry. It doesn't pretend to be human, but it doesn't lead with "as an AI" either. It earns its place in conversations by having something worth saying.

[ expand ]

Conduit // Private AI Comms Platform

[ LIVE ]
Fully self-hosted, encrypted communication platform providing seamless AI assistant access across Android, web, and CLI. Cross-device message sync, persistent AI sessions with full tool access, and zero cloud dependency — all traffic stays on-premises.
python fastapi kotlin jetpack-compose postgresql websocket aes-256-gcm tailscale

Architecture: Python FastAPI server handling JWT auth, WebSocket routing, and message brokering. Claude Code CLI backend with persistent sessions provides the AI layer with full system tool access (bash, filesystem, network). PostgreSQL with asyncpg for storage. All messages encrypted at rest with AES-256-GCM.

Android Client: Native Kotlin/Jetpack Compose app with biometric + PIN auth, custom adaptive icon (shield/chat/padlock motif), persistent WebSocket via foreground service for instant delivery, and TLS certificate pinning compiled into the binary. Zero Google dependency — no Firebase, no Play Services.

Web Client: Lightweight vanilla HTML/CSS/JS SPA with dark theme, WebSocket real-time messaging, and JWT auth with localStorage persistence.

Sync & Networking: All clients receive real-time message broadcasts — user messages, AI responses, and delivery confirmations synchronised across every connected device. Accessible via Tailscale WireGuard mesh VPN from anywhere, plus local network for low-latency home access. Self-signed certs with SANs covering all access points.

Security Model: Zero cloud dependency. Encryption at rest (AES-256-GCM) and in transit (TLS 1.3 with cert pinning on mobile). JWT device auth. No third-party push services. Network isolation via VPN mesh — never internet-exposed.

Built in a single day.

[ expand ]

AI Canary Beacon // Honeypot Layer

[ LIVE ]
Multi-layered honeypot system designed to detect and fingerprint AI web scrapers, automated bots, and human attackers probing the site. Uses canary tokens, tarpit Workers, and decoy files.
honeypot canarytokens cloudflare-workers t-pot

Layers: Decoy files (admin_login.html, backup.sql, wp-config.bak, .env) embedded with unique Canarytoken tracking URLs. sys-admin.html interactive trap page. Cloudflare Worker tarpit for automated scanners. T-Pot honeypot on dedicated Proxmox VM (VLAN 50).

Alerting: All triggers routed to ntfy.sh for real-time push notifications

Philosophy: Defence in depth — if someone is poking around where they shouldn't be, you want to know about it before they find anything real

[ expand ]

ProtonMail Digest Pipeline

[ DEPLOYING ]
Automated email digest system using ProtonMail Bridge in a Proxmox LXC, with AI-powered summarisation (Haiku) and push notifications via ntfy.sh.
protonmail python haiku ntfy lxc

Stack: ProtonMail Bridge (IMAP) → Python script → Anthropic API (Haiku) for summarisation → ntfy.sh for push delivery

Hosting: Proxmox LXC container for lightweight, isolated execution

[ expand ]
// HARDWARE & FABRICATION

The Cass Rack // Custom 13U 10" Rack

[ DESIGNED ]
Custom-designed 3D-printable 13U 10-inch server rack with crystalline low-poly side panels, cage nut rails, integrated fan mounts, 2U drawer, and a Cass logo faceplate. All 19 parts designed in FreeCAD.
freecad 3d-printing rack-design occt

Design tool: FreeCAD with OCCT kernel — the breakthrough for generating printable STL output after multiple failed approaches

Rack contents: 3× Dell OptiPlex 3000 (Proxmox nodes), 1× Lenovo M700q (Claude Code/Debian), 2× USW-Flex-2.5G-5 switches, patch panel — approximately 7U of a 9U Tecmojo rack

Manufacturing: All 19 parts uploaded to CraftCloud3D. SLS PA12 quotes were high enough to prompt research into personal 3D printer purchase (Creality K1 Max / Bambu Lab)

[ expand ]
// WEB DEVELOPMENT

cassam.io // CASSAM TRINITY

[ LIVE // V14 ]
Personal portfolio and digital CV built as a retro CRT terminal interface. Matrix rain splash screen, terminal typing animations, dual-monitor Proxmox project page, and a layered security architecture including Turnstile CAPTCHA, honeypot form fields, bot-trapping robots.txt entries, and CSP headers.
html/css/js cloudflare-pages github turnstile web3forms csp

Stack: Static HTML/CSS/JS, PicoCSS, Cloudflare Pages with GitHub CI/CD, Cloudflare Pages Functions (serverless contact form)

Contact form architecture: Two-step submission — Step 1: browser sends to Cloudflare Pages Function which verifies Turnstile CAPTCHA server-side. Step 2: on verification success, browser submits directly to Web3Forms API (bypasses Cloudflare Worker-to-Cloudflare blocking issue)

Security layers: Content-Security-Policy headers via _headers file, Turnstile bot protection, honeypot form field, canary token decoy files, AI canary beacon, CSP restricting script/style/connect sources

[ expand ]
// COMMERCIAL & CLIENT-FACING

Wolds Cyber Free Scanner // Website Security Tool

[ LIVE ]
A free website security scanning tool built on Cloudflare Pages Functions. Checks SSL/TLS certificates, HTTP security headers, DNS email security (SPF/DMARC), exposed sensitive files, technology fingerprinting, and more — all from a single URL input. Built with zero external dependencies, rate-limited via Cloudflare KV, with automated lead capture and Telegram notifications for new signups.
cloudflare-pages-functions serverless kv dns-over-https telegram-bot-api security

Architecture: Cloudflare Pages Functions (serverless) — zero external dependencies, fully edge-deployed

Scope: 9 check categories, 15+ individual checks including SSL/TLS, security headers, SPF/DMARC (via DNS over HTTPS), exposed files, and technology detection

Rate limiting & storage: Cloudflare KV-backed rate limiting and result caching

Lead qualification: Company-email-only account creation filters out noise and qualifies genuine business leads

Notifications: Automated alerts via Telegram Bot API when new accounts are created

Live at: woldscyber.co.uk/scan

[ expand ]
// EDUCATION & CERTIFICATION

Open University // Diploma in Network Engineering

[ IN PROGRESS ]
Part-time distance learning diploma covering networking fundamentals, routing and switching, network security, and systems administration.
open-university networking diploma

Existing homelab experience covers the majority of practical domains — structured study targets the exam-specific theory and methodology gaps.

[ expand ]

CompTIA Network+ // Certification

[ PLANNED ]
Industry-recognised certification validating networking knowledge across troubleshooting, configuration, and management of wired/wireless infrastructure.
comptia certification network+

Existing homelab experience covers the majority of practical domains — structured study targets the exam-specific theory and methodology gaps.

[ expand ]

root@nest-core:~#