NCHAUPE SOLOMON SETSHEDI's Projects
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
Small and highly portable detection tests based on MITRE's ATT&CK.
A curated list of Awesome Threat Intelligence resources
BINGO Android Game
Tools and Techniques for Blue Team / Incident Response
Automated Adversary Emulation Platform
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Created with StackBlitz ⚡️
Covid-19 inspired Code training Repository for Python, Java, JavaScript And Angular Framework and some secure by design concepts and Clean code concepts
Andela Assessment Python Challenge
Hello, world! This is CS50 (aka CS50x through edX), Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.
CTFs as you need them
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
Platform to host Capture the Flag competitions
Abuse reporting app