initializing
hi. i’m caleb.
loading 0% • assets
DaisyUI • projects, certs, and writeups.
/home caleb
Download CV
portfolio / cv

security-minded
systems engineer.

tooling, labs, reverse engineering, and clean motion first UI.

Hamilton, New Zealand Cybersecurity • Networking • Systems Python • JS • Infra
About me
Hamilton, New Zealand • UTC+13

Hey!

I'm caleb, a Waikato based security minded systems engineer. I recently completed a Bachelor of Information Technology with a focus on cybersecurity, networking, and systems administration. I spend a lot of time doing CTFs (HackTheBox, Crackmes, TryHackMe, NZCSC and more), breaking and hardening lab environments, and building tooling to make security tasks smoother.

Outside of keyboards and terminals, I'm into gaming, car projects (my Mazda 6), and over engineering my homelab for fun.

Download full CV (PDF)

Stats

Years in IT / cyber
0 yrs
Student → practitioner
Degrees/certs
0 dgre
Certificate of IT, Bachelor of IT, TryHackMe Cert
Projects & tools
0 +
Scripts, sites, infra builds
CTFs & labs
0 +
HTB / THM / NZCSC boxes
Roughly up to date.
Recent projects

Latest builds & experiments

Mostly Python, JS & infra
Screenshot of RiskScoring tool
Security / Risk
RiskScoring Web • Scoring Engine

Web-based vulnerability & business risk scoring

A lightweight risk scoring tool for assessing vulnerabilities on a 0–5 scale with category weighting, color-coded severity, sortable breakdowns, presets, and export to CSV/JSON.

Screenshot of KQL-Helper / KQL Configurator
Blue Team / KQL
KQL-Helper Browser Tool

Schema-driven KQL template builder & secure exporter

Browser-based KQL configurator with typed schema generation, placeholders, conditionals, local persistence, and secure exports (AES/XTEA/RSA hybrid).

Screenshot of Type-S UnderGlow Python controller
Reverse / BLE
typesled-hack Python • BLE • TEA

Reverse-engineering Type-S UnderGlow BLE control

Decompile Android app → identify UUIDs, TEA key, encrypted command format. Rebuilt control flow in Python and validated behaviour on-device.

All projects

Projects list

Click files on the left to explore
project detail

Select a project on the left

This section goes deeper: each node maps to a real project — tools, scripts, overlays, homelab builds, and coursework pieces that were actually useful. Click around the tree to see the story behind each item, including tech used, screenshots, and links.

CTF writeups

Puzzle trail & learning notes

TryHackMe • HackTheBox • NZCSC
Live challenge

Think you can break it?

I host my own CTF-style challenges alongside these writeups. No walkthroughs. No hints unless you earn them. Just you, the target, and whatever tools you trust. Rules are on the CTF page

Web Linux Logic flaws Beginner → Intermediate
self hosted • no signup required
writeup detail

Select a writeup on the left

I treat CTFs as an excuse to dive into tools, protocols, and weird edge cases you don't always hit in normal work. Pick a path (TryHackMe, HackTheBox, NZCSC) to see examples of web, pwn, forensics, and network challenges I've worked through.