Austin's repositories
awesome-CISO-maturity-models
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
AWS-malware-lab
Creation of a laboratory for malware analysis in AWS
azure-resource-graph
Collection of Azure Resource Graph queries for use in Portal and via PowerShell - by @JesseLoudon
Beginner-Network-Pentesting
Notes for Beginner Network Pentesting Course
bletools
BLE pentesting scripts
blind-sql-bitshifting
A blind SQL injection module that uses bitshfting to calculate characters.
Bug_Scraper
A tool for bug bounty researchers to identify valid domains and urls in public HackerOne/BugCrowd programs
DFIR-notes
Random notes collected on the intertubes relating to DFIR
FBI-tools
🕵️ OSINT Tools for gathering information and actions forensic🕵️
firmwaretools
a set of scripts and tools for various firmware analysis tasks
HAS-Qualifier-Challenges
Hack A Sat 2020 Qualifier Challenges
iceberg
File server using client certificate authentication and policy-based access control
impacket
Impacket is a collection of Python classes for working with network protocols.
KQL
Kusto Query Language
LinkedInt
LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation
meioc
Extracting IoC data from eMail
Misc
Random things for my own reference
ocreeb-12
A 12 key macropad running KMK
Presentations
my presentations at security conferences
raspberry-pi-web-simulator
Raspberry Pi
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
ssh-honeypot
Fake sshd that logs ip addresses, usernames, and passwords.
stego-toolkit
Collection of steganography tools - helps with CTF challenges
vmcloak
Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.
VMwareCloak
A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis.