Name: Nigatu Nigusie
Type: User
Company: Ethiopian Education and Research Network(EthERNet)
Bio: System Administrator + Web Developer + Exploiter
Twitter: kakuye2
Location: Addis Ababa,Ethiopia
Blog: https://ethernet.edu.et/
Nigatu Nigusie's Projects
Learn where some of the network sysctl variables fit into the Linux/Kernel network flow
A collection of resources for linux reverse engineering
Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information
LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure)
The Admin Interface Framework
An Open Source Java Decompiler Gui for Procyon
Source code about machine learning and security.
A practical guide to securing macOS.
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
A command line tool to find malwares on http://openmalware.org
Animation engine for explanatory math videos
for concurrent exploiting
Course materials for Modern Binary Exploitation by RPISEC
Golang package for gossip based membership and failure detection
Educational, CTF-styled labs for individuals interested in Memory Forensics
Protected E-mail Headers
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Command line Search Engines Framework but without API key
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Meterpreter Paranoid Mode - SSL/TLS connections
A collection of scripts for activating Microsoft products using HWID / KMS38 / Online KMS activation methods with a focus on open-source code, less antivirus detection and user-friendliness.
A post-exploitation powershell tool for extracting juicy info from memory.
Miscellaneous projects related to attacking Windows.
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
Infection Monkey - An automated pentest tool
MoP - "Master of Puppets" - Advanced malware tracking framework