Name: Tanner Harper
Type: User
Company: The University of Texas at Austin
Bio: Security Engineer based out of Austin, Texas, with particular interests in embedded systems, cloud-based infrastructure, and wireless security.
Location: Austin, Texas
Tanner Harper's Projects
Small and highly portable detection tests based on MITRE's ATT&CK.
C# as you know it but with Go-inspired tooling (small, selfcontained, and native executables)
Six Degrees of Domain Admin
PoC scripts demonstrating the BlueBorne vulnerabilities
CS 439 course OS
SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. (forked from http://git.cyrusimap.org/cyrus-sasl/). Build on Windows platform.
My collection of dockerfiles
Empire is a PowerShell and Python post-exploitation agent.
A Linux alternative to enum.exe for enumerating data from Windows and Samba hosts.
Exploit Database binary exploits located in the /sploits directory
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
📹 A tool to locally capture your own Nest camera stream.
Directory/file & DNS busting tool written in Go
World's fastest and most advanced password recovery utility
Small tool to capture packets from wlan devices.
Portable solution for capturing wlan traffic and conversion to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = capture, convert and calculate candidates, x = different hashtypes
Password cracking rules for Hashcat based on statistics and industry patterns
Modified hostapd to facilitate AP impersonation attacks
The IKE Scanner
Impacket is a collection of Python classes for working with network protocols.
This is the official repo for the Jumbo version of John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1 (but we are literally several thousands of commits ahead of it).
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
WIreless Hacking Tools
The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another.
One rule to crack all passwords. or atleast we hope so.
PowerShell for every system!
PowerSploit - A PowerShell Post-Exploitation Framework