[ WELCOME_TO_MY_ARCHIVE ]
I'm Sarah Eid, a Senior Computer Science student at Effat University with a strong focus on cybersecurity, alongside a growing interest in AI-assisted analysis.
This portfolio serves as a curated digital archive of my technical work, research, and ongoing development.
Automated red-teaming framework for evaluating LLM safety robustness. Multi-round adversarial agent loop with attacker prompts, target LLM responses, and judge evaluation. Includes human review override and exportable scoring.
Comprehensive penetration testing portfolio: Google Dorks, OSINT, Nmap, SQL injection (manual + sqlmap), XSS, SET credential harvesting, Hashcat password cracking, and full penetration test report.
Hands-on GRC portfolio including framework integration memos, incident response plans (NIST SP 800-61), risk registers (ISO 31000), and KSA-specific compliance assessment for Saudi cybersecurity regulations.
A machine learning project predicting student placement outcomes and salary ranges based on academic performance and experience, providing data-driven insights for the Saudi Arabian context.
Randomly selects a movie from your Letterboxd watchlist and enriches it with metadata via the OMDb API. Offers AI-powered recommendations based on plot similarity. Built with Streamlit and Python.
Sets up a virtual lab environment, captures network traffic using Wireshark, and analyzes TCP/IP and HTTP behavior in OWASP Juice Shop — identifying plaintext credentials and exposed session tokens.
A collection of algorithmic solutions to complex data structure problems involving trees, graphs, and range queries — demonstrating efficient implementation for large-scale constraints.
An object-oriented restaurant ordering system in Java, modeling real-world billing workflows using clean OOP principles — handling menus, orders, bill calculation, and payment via a console interface.
Develops and compares ML models to predict employability and expected starting salary for university students. Integrates campus placement records, salary benchmarks, and a global developer survey to build a predictive framework for Saudi Arabia's Vision 2030 labor market.
Examines how Zero Trust Architecture can enhance security in IoT ecosystems across healthcare, smart cities, and enterprise systems — evaluating continuous authentication, least privilege access, and micro-segmentation strategies.
A literature review analyzing how embedding security mechanisms like static analysis, threat modeling, and DevSecOps throughout the SDLC reduces vulnerabilities. Identifies key practices and critical research gaps in empirical validation.
Examines the development and challenges of biometric authentication technologies — analyzing modalities including spoofing vulnerabilities and privacy concerns, and identifying gaps in anti-spoofing mechanisms and inclusive system design.