cmbadgett @ homelab :~$ whoami

Christopher
Badgett

const roles = [

'cybersecurity student',

'homelab builder',

'3D printing hobbyist',

]

I break things in controlled environments, build redundant storage systems at home, and turn spools of plastic into useful stuff. Currently studying cybersecurity and expanding my homelab one rack unit at a time.

72 TB

NAS capacity

4

Pi cluster nodes

8+

3D prints this year

homelab rabbit holes

Featured Projects

Homelab NAS Server
active

Homelab NAS Server

72 TB of redundant storage on TrueNAS Scale with ZFS

A purpose-built network-attached storage server running TrueNAS Scale. Features a 6-drive ZFS RAIDZ2 pool, a separate SSD cache VDEV, automated S3-compatible snapshots to Backblaze B2, and container workloads for Plex, Nextcloud, and a private container registry.

TrueNASZFSLinuxDocker
CTF Toolkit
active

CTF Toolkit

A batteries-included CLI for capture-the-flag competitions

A Python CLI built to accelerate common CTF workflows: automated base-encoding detection and decoding, frequency analysis for classical ciphers, steganalysis helpers (LSB extraction, zsteg wrappers), format string exploit templating, and a local flag tracker with per-challenge notes.

PythonSecurityCTFCryptography
Homelab Network Monitor
active

Homelab Network Monitor

Full-stack DNS-level ad blocking and traffic visibility

A self-hosted network observability stack: Pi-hole for DNS sinkholing paired with Unbound as a recursive resolver, metrics scraped by Telegraf, stored in InfluxDB, and visualised in Grafana. Provides per-device traffic dashboards, alerting on anomalous query spikes, and weekly HTML digest emails.

Pi-holeGrafanaInfluxDBNetworking
Flipper Zero Wi-Fi Attack Analysis
completed

Flipper Zero Wi-Fi Attack Analysis

WPA2 deauth + Evil Twin attacks with a $200 pocket device

University of Akron CIS senior capstone. Demonstrated two wireless attack vectors against WPA2-Personal networks using a Flipper Zero with ESP32 Wi-Fi Dev Board (Marauder firmware): a deauthentication handshake capture cracked offline with Hashcat on a GPU-accelerated Parrot OS VM, and an Evil Twin captive portal harvesting credentials through spoofed Apple, Starbucks, and TP-Link login pages. Verified mitigations including WPA3-Personal (fully blocks hash extraction), strong passphrases, and user awareness.

SecurityWi-FiPentestingFlipper Zero