Mark's Projects
A Crystal web framework that makes building applications fast, simple, and enjoyable. Get started with quick prototyping, less bugs, and blazing fast performance.
Interesting apt report collection and some special ioc express
A Node.js library for ansi codes, figlet fonts, ascii art and other ASCII graphics
My notes used in preparation for AWS SysOps certification.
Blockstack/Tor integration
Hide screen when boss is approaching.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
CVE-2019-2107
Personal Profile
A Chrome extension for measuring screen dimensions
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
A Dead Simple VPN.
ESP8266 based droneID spoofing Throwie example for DJI DroneID (Remote Drone Identification broadcast)
PHP function tracker
A small, simple and secure VPN
Google maps, directions, markers, clusters, custom icons, real-time gps updates (like uber) and more
A DevTools proxy (Chrome Remote Debugging Protocol) for iOS devices (Safari Remote Web Inspector).
JIRA Secure Attachment Looter
Gets in the way of your victim's traffic and out of yours
Learn OpenCV : C++ and Python Examples
A device library and logging system using RFID technology.
Case-Study Write-ups on Malware Samples, forked to add my observations. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com
The purpose of this project is to research and develop a working web application that works like Google Maps (utilizing the Google Maps API) but also including DOT (Department of Transportation) data to add road dimensions. After it's completion, its functionality would be repurposed to possibly assist drivers and autonomous vehicles to correc their path lest they deviate from a lane's center, a route's path, or a road in general in order to provide a safety assisting backup whilst the operator is in motion in a vehicle.
Leaked Mirai Source Code for Research/IoC Development Purposes
The Multipath UDP Deflector
Real-time performance monitoring, done right! https://my-netdata.io/
This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-Fi SoC (System-on-a-Chip), programmable with the Arduino IDE. With this software flashed onto it, you can select a target network and start different attacks. The deauth attack will, if the connection is vulnerable, disconnect the devices from the network. Because the attack is running constantly, the devices will be disconnected again and again. Depending on the network, that can either block a connection or slow it down. The difference between deauthing and jamming: WiFi Jammers vs Deauthers | What's The Difference? Other attacks also have been implemented, such as beacon and probe request flooding. The deauth attack works by exploiting an old and known vulnerability in the 802.11 Wi-Fi protocol. Because these deauthentication frames, usually used to close a Wi-Fi connection safely, are unencrypted, it's very easy to spoof them.
Comparing densities of mobile cell towers with population estimates