Back
Background

Protocol Zero

Network Penetration Framework

Scroll

Role

Security Researcher

Year

2026

Category

Cybersecurity

Live Site

Visit Link

The Challenge

Traditional pentesting tools were too loud and slow for real-time IoT environments. The goal was to create a stealthy, lightweight agent that could audit network traffic without triggering IDS.

The Solution

Engineered a multi-threaded Python-based scanner with C++ hooks for low-level packet manipulation. Integrated a reporting dashboard that visualizes attack vectors in real-time.

Key Features

1

Automated Vuln Scanning

2

Packet Injection/Spoofing

3

Real-Time IDS Evasion

4

IoT Protocol Fuzzing

5

Encrypted Reporting

Technologies Used

PythonC++WiresharkAssembly
Protocol Zero

Next Project

Cheddera

LET'S TALK

Have a project in mind?

LET'S TALK

Local Time

GMT

Status

Available for work

Credit

© 2026 Olaoluwa Aina