Name: Andreas Nilsen
Type: User
Company: Andreas - OpSec - Consultant, Dev. Reverse Engineering
Bio: Security Researcher/Consultant.
Developer.
Reverse Engineer.
Gamer.
But first and foremost: A Family Guy.
Twitter: adde88
Location: Norway
Blog: https://www.facebook.com/adde88
Andreas Nilsen 's Projects
Python script to download all images/webms of a 4chan thread
Just a working add-apt-repo file for Kali Linux Rolling Edition 2016.1
WiFi security auditing tools suite
Repo containing Openwrt Makefiles and Installation files for the latest version of Aircrack-ng
A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem
transform your payload.exe into one fake word doc (.ppt)
Script for orchestrating mana rogue WiFi Access Points.
Part of the aircrack-ng (experimental version) for the WiFi Pineapples, with custom scripts.
Bully WPS Attack Tool
Public repository for Cantordust Ghidra plugin.
Bruteforce tool for Jenkins and Salsa
Rotations for CloudMagic
Simple awk script to extract the most common substrings from an input text. Built for password cracking.
CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping. Names can be formatted in a defined naming convention for further security testing.
A Qt and C++ GUI for radare2 reverse engineering framework
Exploit toolkit CVE-2017-0199 - v3.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious (Obfuscated) RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
Scanner PoC for CVE-2019-0708 RDP RCE vuln
PoC for CVE-2019-5736
Automate getting Domain Admin using Empire (https://github.com/EmpireProject/Empire)
A multipurpose tool to assist with World of Warcraft addon development
a digispark arduino script to pop a reverse hidden shell to a specified ip address using netcat.
A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
pseudo-code to show how to disable patchguard with win10
D-Link firmware decryption PoC
Offensive DNS server