Ted Mwai's Projects
An unofficial Google Nearby Share app for macOS
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Simple bash Oneliners to make life easier
Securely and anonymously share files, host websites, and chat with friends using the Tor network
A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the security of their devices.
Orchestration engine
The fastest knowledge base for growing teams. Beautiful, realtime collaborative, feature packed, and markdown compatible.
Passbolt CE Backend, a JSON API written with CakePHP
Renders possibly unsafe PDF files and outputs harmless PDF files
After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools that will be able to identify & validate the presence of the spyware on your mobile devices, and tablets. Initial detection points were derived from the mvt-project.
My Notes about Penetration Testing
A GPT-empowered penetration testing tool
Main repository for pfSense
A collection of phishing samples for researchers and detection developers.
PingCastle - Get Active Directory Security at 80% in 20% of the time
Validation of best practices in your Kubernetes clusters
Portable VS Build Tools installer
An offensive and defensive security toolset for Microsoft 365 Power Platform
PowerSploit - A PowerShell Post-Exploitation Framework
A small util to brute-force prefetch hashes
Abusing impersonation privileges through the "Printer Bug"
This program is designed to demonstrate various process injection techniques
Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.
PowerShell script for deobfuscating encoded PowerShell scripts
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Curated list of public penetration test reports released by several consulting firms and academic security groups
A collection of all the data i could extract from 1 billion leaked credentials from internet.
The only tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE, or spoofing required.
Transfer files over WiFi between your computer and your smartphone from the terminal