-
Notifications
You must be signed in to change notification settings - Fork 3
/
index.html
193 lines (187 loc) · 10.5 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
<!DOCTYPE html>
<html lang="en">
<head>
<title>Cookie Engineer's Portfolio (🍪🔧)</title>
<!-- Meta -->
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=0.5, maximum-scale=2, user-scalable=yes">
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="black-translucent">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="creator" content="Cookie Engineer">
<meta name="description" content="Portfolio of Cookie Engineer and their Open Source projects">
<meta name="keywords" content="Artificial Intelligence, Machine Learning, Automation Engineer, Software Engineer, Mad Scientist">
<meta name="generator" content="Cookie Engineer with some beer and nightly VIM sessions">
<meta name="robots" content="index, follow">
<link rel="alternate" type="application/rss+xml" href="weblog/feed.xml">
<!-- Social Meta -->
<meta property="og:title" content="Cookie Engineer's Portfolio">
<meta property="og:site_name" content="Cookie Engineer's Portfolio">
<meta property="og:description" content="Portfolio of Cookie Engineer and their Open Source projects.">
<meta property="og:image" itemprop="image" content="https://cookie.engineer/design/about/avatar/cookiengineer.png">
<meta property="og:url" content="https://cookie.engineer/index.html">
<meta property="og:type" content="website">
<meta name="twitter:card" content="summary">
<meta name="twitter:domain" content="cookie.engineer">
<meta name="twitter:title" itemprop="name" content="Cookie Engineer's Portfolio">
<meta name="twitter:description" itemprop="description" content="Portfolio of Cookie Engineer and their Open Source projects.">
<!-- Website Design -->
<link rel="stylesheet" href="/design/layout/index.css">
<link rel="stylesheet" href="/design/about/index.css">
<!-- Website Functionality -->
<link rel="stylesheet" href="/design/menu/index.css">
<script src="/design/menu/index.js" defer></script>
<link rel="stylesheet" href="/design/about/avatar/index.css">
<script src="/design/about/avatar/index.js" defer></script>
<!-- Magic: Copy/Paste -->
<link rel="stylesheet" href="/design/magic/index.css">
<script src="/design/magic/index.js" defer></script>
<!-- Game: Consent -->
<link rel="stylesheet" href="/design/consent/index.css">
<script src="/design/consent/index.js" defer></script>
</head>
<body>
<header>
<aside id="menu" class="visible">
<a id="menu-button" href="#menu">Menu</a>
<a href="#about">About Me</a>
<a href="#skills">Skills</a>
<a class="icon-section" href="/projects.html">Projects</a>
<a class="icon-section" href="/talks.html">Talks</a>
<a class="icon-section" href="/contact.html">Contact</a>
<a class="icon-section" href="/weblog/index.html">Web Log</a>
</aside>
</header>
<section id="about">
<figure id="avatar">
<img alt="Cookie Engineer's Avatar" src="/design/about/avatar/cookiengineer.png" width="256" height="256">
<figcaption>
Hello, I'm <b>Cookie Engineer</b>,<br>
probably a Mad Engineer with AI, NetSec, WebSec, and OSINT experience.
<br><br>
<small title="Oh and I use Arch Linux, funny I did almost not mention that.">BTW my web log's over at <a href="/weblog/index.html">/weblog</a></small>
<br>
<small title="Well, or if you feel like hash cracking... have phun.">My CV's over at <a href="/cv/index.html">/cv</a></small>
</figcaption>
</figure>
<div id="about-socialize">
<a class="icon-github" title="GitHub" href="https://github.com/cookiengineer" target="_blank">GitHub</a>
<a class="icon-gitlab" title="GitLab" href="https://gitlab.com/cookiengineer" target="_blank">GitLab</a>
<a class="icon-linkedin" title="LinkedIn" href="https://www.linkedin.com/in/cookiengineer" target="_blank">LinkedIn</a>
</div>
<h1>Hello, fr1end.</h1>
<article>
I am Cookie Engineer (also known as 🍪🔧), and I'd like to welcome you to my website.
This website mostly contains a curated list of my work and stuff I've built over
the years.
<br><br>
My background has always been Network Security, Web Technologies, Open Source,
Artificial Intelligence (not only Machine Learning), and the creation of automated
self-adapting systems of all types. I solve problems by teaching machines how to solve
it and I'm good at creating the Software Architecture behind it to make it possible.
<br><br>
I also create a lot of personal tools to automate my workflows. A huge part of my
written software is Open Source, except the ones that are under NDA or were classified
by my customers and contract partners (obviously). But I do believe in Open Source,
just as I believe in the Robot Overlords.
</article>
<article>
Wanna pwn my machines? Take a look at my
<a class="icon-github" href="https://github.com/cookiengineer/dotfiles" target="_blank">dotfiles</a> and my
<a class="icon-github" href="https://github.com/cookiengineer/dotvim" target="_blank">dotvim</a> repositories.
<br><br>
There's also a little hacking challenge hidden in this website. It's Open Source on
<a class="icon-github" href="https://github.com/cookiengineer/cookie.engineer" target="_blank">GitHub</a> and
<a class="icon-gitlab" href="https://gitlab.com/cookiengineer/cookie.engineer" target="_blank">GitLab</a>, too,
in case you want to know how things work.
<br><br>
Enjoy your stay.
</article>
<h1>Cyber Defense/Security Work</h1>
<article>
My personal offered services include being an AI Engineer, Cyber/Web Analyst or
IT-Security Consultant due to my specialization in Cyber Defense, Cyber Intelligence
and the autonomous code generation parts behind networked simulation environments.
<br><br>
Whenever I have enough time to spare I'm trying to automate the autonomous Cyber Defense
Network that is called the <a class="icon-website" href="https://tholian.network" target="_blank">Tholian Network</a>
and aims to fully automate Security Audits, Incident Response and Penetration Testing.
<br><br>
If you have interesting problems that need more efficient solutions, don't hesitate to <a class="icon-section" href="#contact">contact me</a>.
</article>
</section>
<section id="skills" class="momentum">
<h1>Skills.</h1>
<article>
<h3>Network Security</h3> <progress value="95" max="100" data-label="15 years"></progress>
<p>
I have a specialization in the knowledge of network protocols, their implementations
and specification quirks that could lead to potential attack vectors.
<br><br>
This includes strong knowledge in network protocols such as
<abbr title="Transmission Control Protocol">TCP</abbr>,
<abbr title="User Datagram Protocol">UDP</abbr>,
<abbr title="Message Queuing Telemetry Transport Protocol">MQTT</abbr>,
<abbr title="Internet Control Message Protocol">ICMP</abbr>,
<abbr title="Simple Network Management Protocol">SNMP</abbr>,
<abbr title="SOCKet Secure">SOCKS</abbr>,
<abbr title="Transport Layer Security">TLS</abbr>
and all protocols related to the Web such as
<abbr title="Hyper Text Transfer Protocol/Secure">HTTP/S</abbr>,
<abbr title="Speedy Protocol">SPDY</abbr>,
<abbr title="Quick UDP Internet Connections">QUIC</abbr>,
<abbr title="Domain Name System">DNS</abbr>,
DNS over HTTPS, DNS over TLS, DNS-based Service Discovery,
<abbr title="Web Real-Time Communication">WebRTC</abbr>
and <abbr title="Web Sockets">WS13</abbr>.
<br><br>
Most of my open source software is peer-to-peer, meaning they use <abbr title="Network Address Translation">NAT</abbr>
traversal and <abbr title="Network Address Translation">NAT</abbr> breaking techniques to find other local and global
peers. Those techniques are similar to how malware often works, as most of them use <abbr title="Domain Name System">DNS</abbr>
Exfiltration, Multicast and Relaying, and even PWNAT- or
<abbr title="Internet Control Message Protocol">ICMP</abbr>-spoofed attacks to contact their <abbr title="Command and Control Center(s)">CNCs</abbr>
once they successfully infiltrated a device.
</p>
</article>
<article>
<h3>Network Forensics</h3> <progress value="75" max="100" data-label="10 years"></progress>
<p>
My previous employments included building up Blueteams in the Cyber Defense space,
wherein AI-based <abbr title="Intrusion Detection Systems">IDSes</abbr> were being
built, trained, and used in order to gain a strategical advantage on the Blueteam
side.
<br><br>
My experience helped me to create a deep understanding of how to build trainable
automated network security systems that can learn from traffic fingerprinting and
the behaviour of networked nodes and their communications.
<br><br>
My work with co-evolutionary systems like backpropagated
<abbr title="Evolvable Substrate / Hypercube-based Neural Evolution of Augmenting Topologies">ES/HyperNEAT</abbr>
gives me the knowledge to create virtual simulations and pentesting scenarios that
can be easily replicated and adapt to new infiltration targets.
<br><br>
Additionally those virtual environments usually are multi-agent simulations
of vast network topologies and reuse existing <abbr title="Packet Capture">PCAP</abbr>
files or streams from previous attack scenarios to train the
<abbr title="Compositional Pattern Producing Networks">CPPNs</abbr> more efficiently.
</p>
</article>
<article>
<h3>Cyber Intelligence</h3> <progress value="100" max="100" data-label="20 years"></progress>
<p>
Over the past years many of my projects were indirectly trying to automate the
<abbr title="Open Source Intelligence">OSINT</abbr> methodologies that still need human
interaction to acquire information online, such as the <a href="/projects.html#/open-source-research">Research</a>
and <a href="/projects.html#/open-source-stealth">Tholian Stealth</a> projects.
<br><br>
My unique perspective with the usage of co-evolutionary AI systems allows me to build
self-automating and self-adapting systems that help to exceed the frontiers of what
you can do with the Knowledge on the Web.
</p>
</article>
</section>
<footer>
<p>Made with <abbr title="broken heart">💔</abbr> in Heidelberg, Germany. All rights (and jokes) reserved under European Law.</p>
</footer>
</body>
</html>