Skip to content
View scottalt's full-sized avatar

Block or report scottalt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
scottalt/README.md

Hey, I'm Scott ๐Ÿ‘‹

Senior Information Security Engineer focused on building tools and automation that help organizations defend against real-world threats. I spend most of my time between security engineering and applied research, figuring out what's broken and then building something to fix it.

Studied software engineering, moved into cybersecurity, and found the space where both skill sets matter most. AI-assisted development has brought the builder side back out in a big way.

What I Work With

Python PowerShell Azure Linux Git

What I'm Working On

๐Ÿ”ฌ Threat Terminal is my current research project. It's an interactive platform that studies how well humans detect AI-generated phishing when linguistic quality is no longer a reliable signal. Players classify 1,000 AI-generated emails across six attack vectors (urgency, authority impersonation, credential harvesting, hyper-personalization, pretexting, and fluent prose) while the platform collects pseudonymous research data. The study protocol is published on Zenodo. Source code ยท Research overview

๐Ÿ›ก๏ธ Enterprise-Zapp scans Entra ID tenants for orphaned apps, risky service principals, and misconfigured app registrations. It produces a risk-rated inventory so security teams can clean up what they didn't know was there.

๐Ÿƒ Threat-Intel-Tarot turns 78 real adversary profiles from MITRE ATT&CK into a tarot card deck. It's a creative way to explore TTPs, export ATT&CK Navigator layers, and make threat intelligence more approachable.

๐Ÿ“š infosec-resources is an opinionated guide for people breaking into cybersecurity, covering roadmaps, certs, labs, and common mistakes.

Why I Open Source

I learn the most when I build in the open. Sharing tools and research means other people can poke holes in it, improve it, or use it to solve problems I hadn't thought of. That feedback loop is the whole point.

GitHub Activity

Activity Graph

Connect

Website LinkedIn

Pinned Loading

  1. ai-email-threat-research ai-email-threat-research Public

    A cybersecurity research game measuring how humans detect AI-generated phishing emails. Built as a retro terminal experience.

    TypeScript 5

  2. Enterprise-Zapp Enterprise-Zapp Public

    Scan your Entra ID tenant for orphaned apps, risky service principals, and misconfigured app registrations. Get a full risk-rated inventory in minutes.

    Python 1