Skip to content
View chetflowers's full-sized avatar
:atom:
Focusing
:atom:
Focusing

Block or report chetflowers

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
chetflowers/README.md

Hi, I’m @chetflowers

I’m passionate about cybersecurity, cloud security, and penetration testing, with a strong focus on AWS security, threat detection, and ethical hacking.

🔍 Current Focus

I’m currently working on AWS cloud penetration testing, threat detection, and logging, while showcasing hands-on projects involving:

  • IAM security & privilege escalation research
  • AWS firewall configurations & cloud networking
  • SIEM integrations & log analysis
  • Offensive security research & cloud pentesting tools

🤝 Collaboration Interests

I’m eager to collaborate on:

  • Cloud security research & AWS red teaming
  • Threat hunting & incident response
  • Capture the Flag (CTF) challenges

📚 Current Studies

  • Whizlabs | AWS: Threat Detection, Logging, and Monitoring via Coursera

🛠 Skills

  • AWS Security | IAM Hardening | Threat Detection
  • Logging & SIEM | Cloud Networking | Firewall Configuration

📬 Let’s Connect

LinkedIn - Chet Flowers

🎱 Fun Fact

I competed in the world’s largest 9-ball tournament in Las Vegas and made it to day three!

Pinned Loading

  1. TrackTheHacker.com TrackTheHacker.com Public

    A BYTE-SIZED BLOG: A FUSION OF FICTION & FACTUAL CYBERSECURITY

    1

  2. getbyebye-site getbyebye-site Public

    Website for GetByeBye, a cybersecurity-focused stalkerware detection tool.

    HTML 1

  3. AWS-VPC-Security AWS-VPC-Security Public

    Secure AWS VPC with Bastion Host & Private Network Access

    1

  4. Azure-Based-Secure-Cloud-Infrastructure-Deployment Azure-Based-Secure-Cloud-Infrastructure-Deployment Public

    This project focuses on building a highly available, secure, and scalable cloud-based environment on Microsoft Azure for XCorp’s Red Team. Designed for cybersecurity testing and training, this infr…

  5. Splunk-Based-Security-Monitoring-Environment-for-Threat-Detection-and-Analysis Splunk-Based-Security-Monitoring-Environment-for-Threat-Detection-and-Analysis Public

    This cybersecurity project is designed to detect, analyze, and respond to security threats using Splunk. This environment simulates real-world security monitoring for a fictional organization, inco…

    1

  6. DVWA-Nikto-Exploitation-Lab DVWA-Nikto-Exploitation-Lab Public

    The project explores three major web application vulnerabilities—SQL Injection (SQLi), Cross-Site Scripting (XSS), and Command Injection—by leveraging Nikto and other offensive security tools withi…