DEV Community

ShadowStrike profile picture

ShadowStrike

Digital Forensics Specialist & cyber security practitioner. I write about DFIR, mobile forensics, and security tooling. CTF competitor — MVS2026 Top 1% globally.

Location Brisbane, Australia Joined Joined on  Personal website https://github.com/ShadowStrike-CTF github website

Education

USYD · UNSW · CSU · Deakin

Pronouns

He/Him

Work

Founder at Strategos

Automating Essential Eight Compliance Checks with PowerShell

Automating Essential Eight Compliance Checks with PowerShell

Comments
9 min read

Want to connect with ShadowStrike?

Create an account to connect with ShadowStrike. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
How to Build a HaveIBeenPwned Breach Auditor in Python

How to Build a HaveIBeenPwned Breach Auditor in Python

1
Comments
9 min read
Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Why Diff Tools Lie: Detecting Hidden File Changes with PowerShell Hash Verification

Comments
8 min read
The 22-Second Problem: What Google Cloud NEXT '26's Agentic Defense Means for Essential Eight Compliance

Google Cloud NEXT '26 Challenge Submission

The 22-Second Problem: What Google Cloud NEXT '26's Agentic Defense Means for Essential Eight Compliance

2
Comments 3
8 min read
E-Waste Aware — Sanitise First, Then Recycle 🌏

DEV Weekend Challenge: Earth Day

E-Waste Aware — Sanitise First, Then Recycle 🌏

4
Comments 1
2 min read
I Built a Security Tool That Does Absolutely Nothing (And It's Terrifyingly Realistic)

April Fools Challenge Submission ☕️🤡

I Built a Security Tool That Does Absolutely Nothing (And It's Terrifyingly Realistic)

4
Comments
2 min read
loading...