Giter Site home page Giter Site logo

Heya!

$\textcolor{#02fd2f}{\textsf{ Have a great week on you! You deserve it!}}$

Want to know something interesting?

$\textcolor{#FF000B}{\textsf{Effort won't disappear}}$


Who are you?
  • Real name: Will
  • Age: 24
  • From: Sweden
  • Has: A speech disorder (namely, I stutter)
  • contact: (contact details can be found below)
  • my blog loneicewolf.github.io
My main focus in life
  • I always have told myself I write/talk too much; But I am beginning to accept it's who I am ^_^
What do you do in GitHub?

$\textcolor{pink}{\textsf{Throwing malware author's work into the recycle bin!}}$

  • Reverse engineering (rootkits,malwares)
  • Malwares and vulns/exploits
  • Cryptography,Steganography and Obfuscation
  • Guides (OS setup guides mainly for security.)

Main Projects

Site Profiles

Projects & Research

pinned

Current Research

EquationGroup

Experiences:

Contact me below:

Click to expand
  • Discord: Ken-Kaneki#3978

Will's Projects

cryptography icon cryptography

Encryption implemented in various languages. like AES and Serpent, more coming.

ctio icon ctio

CTIO - Cyber Threat Intelligence Overlay

curveball icon curveball

PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)

cyberthreatintel icon cyberthreatintel

Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups

danderspritz_docs icon danderspritz_docs

The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers

debian_vm_install icon debian_vm_install

Instruction guide on a debian vm install. (vmplayer) I will make this Intentionally insecure to practice backdoor'ing and penetration testing

decompile-dump icon decompile-dump

Partial stuxnet source decompiled with hexrays, if anyone has better decompile tools feel free to contribute better versions.

discover icon discover

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.

dual_ec_drbg icon dual_ec_drbg

A proof of concept in sage for an attack on the Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) specificed in NIST 800-90A.

dualec_poc icon dualec_poc

This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg

duqu icon duqu

DUQU MALWARE SOURCE + BINARY + More coming

efixplorer icon efixplorer

IDA plugin for UEFI firmware analysis and reverse engineering automation

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.