Ted Mwai's Projects
Archives of the criminal side of the internet
10 Weeks, 20 Lessons, Data Science for All!
Management UI for Spinnaker
Detect Tactics, Techniques & Combat Threats
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making
The Elastic stack (ELK) powered by Docker and Compose.
Create GitHub Resource Download Link
Damn Vulnerable Web Application (DVWA)
DWF Database for DWF entries
Free and Open, Distributed, RESTful Search Engine
Emotet detection tool for Windows OS
WIP Emotet Control Flow Unflattening using miasm and radare2
Flash OS images to SD cards & USB drives, safely and easily.
Evals is a framework for evaluating OpenAI models and an open-source registry of benchmarks.
match command-line arguments to their help text
Collection of Facebook Bug Bounty Writeups
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool.
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
Powerful yet simple to use screenshot software :desktop_computer: :camera_flash:
[Suspended] FakeNet-NG - Next Generation Dynamic Network Analysis Tool
Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.