Skip to content
View chetflowers's full-sized avatar
:atom:
Focusing
:atom:
Focusing

Block or report chetflowers

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
chetflowers/README.md

Hi, I’m @chetflowers. I’m passionate about cybersecurity, cloud infrastructure, and ethical hacking, with a focus on mastering networking, system security, and penetration testing.

I’m currently focused on building a strong foundation in advanced network security, hands-on firewall configuration, and vulnerability assessments while showcasing projects on GitHub.

I’m eager to collaborate on security research, Red Team/Blue Team simulations, and Capture the Flag (CTF) challenges.

Feel free to connect with me: LinkedIn - Chet Flowers

Fun fact: I competed in the world’s largest 9-ball tournament in Las Vegas and made it to day three!

Pinned Loading

  1. TrackTheHacker.com TrackTheHacker.com Public

    A BYTE-SIZED BLOG: A FUSION OF FICTION & FACTUAL CYBERSECURITY

    1

  2. getbyebye-site getbyebye-site Public

    Website for GetByeBye, a cybersecurity-focused stalkerware detection tool.

    HTML 1

  3. AWS-VPC-Security AWS-VPC-Security Public

    Secure AWS VPC with Bastion Host & Private Network Access

    1

  4. Azure-Based-Secure-Cloud-Infrastructure-Deployment Azure-Based-Secure-Cloud-Infrastructure-Deployment Public

    This project focuses on building a highly available, secure, and scalable cloud-based environment on Microsoft Azure for XCorp’s Red Team. Designed for cybersecurity testing and training, this infr…

  5. Splunk-Based-Security-Monitoring-Environment-for-Threat-Detection-and-Analysis Splunk-Based-Security-Monitoring-Environment-for-Threat-Detection-and-Analysis Public

    This cybersecurity project is designed to detect, analyze, and respond to security threats using Splunk. This environment simulates real-world security monitoring for a fictional organization, inco…

    1

  6. DVWA-Nikto-Exploitation-Lab DVWA-Nikto-Exploitation-Lab Public

    The project explores three major web application vulnerabilities—SQL Injection (SQLi), Cross-Site Scripting (XSS), and Command Injection—by leveraging Nikto and other offensive security tools withi…