JS @breaktoprotect's Projects
All the useful scripts (ATUS) here!
POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.
A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.
Exploring multi-label discrete labels classification with CVE paragraph texts as input and CVSS vectors C, I and A as labels with discrete values each having either none, low or high.
Make our lives easier when debugging during exploitation development or reverse engineering
A project to experiment with various deep learning / machine learning to play the Snake game.
An experimental and exploratory repo to train custom model on spaCy.
A fun learning project. A basic app created using Ionic Framework (cross-platform) to help folks separate food and alcohol cost to drinkers and non-drinkers.
A simple fixed Q-targets deep q-learning network agent to play Open AI Gym's CartPole-v01.
Using Genetic algorithm, the program will figure out a specified phrase from an initial population of random N size to select, crossover and mutate with a mutation rate of M through generations of phrases until achieving a complete match.
A setup to manage vulnerabilities on Jira and allow automation of creation and closing of Jira tickets based on scan reports.
A scheduling system for consultants, made by a consultant (or ex-consultant)
Tips & Tricks & Troubleshooting to prepare study lab for OSWE.
Transfer files via screens of GUI remote desktop apps (e.g. RDP, VNC, Citrix, etc)
Yet another NEAT implementation based on the NeuroEvolution of Augmenting Topologies which was developed by Kenneth O. Stanley.
Using pygame library to make a simple game of Snake. If you have owned a Nokia phone before, you should be familiar with the game.
A simple q-learning agent (using Q-table) via reinforcement training learn to play a simple self-made game called Pitfalls.
A generic react CRUD app for code training and cumulative template for future extension.
A quick and dirty POC for Reflected File Download
A quick example that is adapted from Janani Ravi's pluralsight course.
Carve shellcode within the memory using restrictive character set
A sample of what a pipeline that consisted of only security scanners may look like.
A repo for penetration test tools
Test Github Actions Matrix