Jason Eiler Cybersecurity Portfolio

Where data travels, security must follow.

My Cybersecurity Projects

How I Recovered a Lost Password Using a Simple Python Hash Cracker

🧩 Quick Overview Repository: Hash-CrackerLanguage: Python We’ve all been there — you’re trying to log into an old account, and you realize you’ve...

Windows PE Header Parser (C++ Project)

🧠 What It Does This project is a simple C++ program that parses and prints key information from a Windows Portable Executable (PE) file — such as...

Reverse Engineering: File Create, Access, and Modify Times

In today’s exercise, we’re Reverse Engineering: File Create, Access, and Modify Times 🧩 Quick Overview In this investigation, we will: Introduction to...

Incident Response Exercise 3: Investigating a New Attack with Obfuscation

In today’s exercise, we’re tasked with investigating an incident related to two previous investigations from last week. Threat Intel has reported that...

Incident Response Exercise 2: Analyzing a Malicious IP Alert

In this incident response exercise, we’re tasked with investigating a suspicious alert triggered by a connection to a potentially malicious IP...

Investigating a Malicious Connection: Incident Response Exercise 1

🔍 Introduction In this incident response exercise, we are tasked with investigating a suspicious alert triggered by a connection to an IP address...