DrED's Projects
ADDS (Active Directory Domain Services)
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Web app that provides basic navigation and annotation of ATT&CK matrices
A methodology for mapping MITRE ATT&CK techniques to vulnerability records to describe the impact of a vulnerability.
A curated list of tools for incident response
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.
The lab was focused on the Billy Madison exercise which sought to capture the flag: find his 12-grade final exam project. It included following the walkthrough by those who completed the exercise. Students were required to setup the internal network, install the Billy Madison OS on a Virtual Machine, conduct a reconnaissance (foot printing, fingerprinting and enumeration). The scope was limited to the walkthrough as provided by the lab details. The tools and methodology vary based on the student's interest. The attacker machine was Kali, and the target was the Billy Madison. The Billy Madison system is a project based on the plot that an attacker named Erick Gordon plans to take over the Madison Hotels. To achieve this, he has installed malware on Billy's computer just before the two were set to face off in an academic decathlon. Billy has to regain control of his system and decrypt his 12th grade final project or he will not graduate from high school. If not, he fails, loses the decathlon, and loses succession to head of the Madison Hotels. The goal of this lab was to follow the g0blin's walkthrough.
CRITs - Collaborative Research Into Threats
CRITs Services Collection
A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon
Walkthrough some CTFs
Guides on various threat and intelligence tools.
Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()
The open-source repo for docs.github.com
Drone is a Continuous Delivery platform built on Docker, written in Go
About me 😎✨🚀👨🏽💻
This script use the fast scan of rustscan with the deep scan of nmap
A flex mobile shop with PayPal integration
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
Dito GAM
Got Your Back (GYB) is a command line tool for backing up your Gmail messages to your local computer. It uses the standard IMAP protocol but also takes advantage of some custom Gmail IMAP extensions. For help with GYB, see the Getting Started Guide at https://github.com/jay0lee/got-your-back/wiki
The Grails Web Application Framework
ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python
Through a Freedom of Information request, WNYC obtained records from the Mayor's Office of Special Enforcement of 2,684 inspections looking for illegal short-term rental activity in New York City. The inspections occurred from October 2013 through April 2015.
UNIVERSIDAD DE ORIENTE SEDE JULIO ANTOMIO MELLA FACULTAD DE INGENIERIA ELÉCTRICA DEPARTAMENTO DE INFORMÁTICA SISTEMA DE INFORMACIÓN PARA LA GESTIÓN Y CONTROL DE LOS RECURSOS Y SERVICIOS ADMINISTRATIVOS DEL CIROA Tesis para optar al grado de Ingeniero en Informática Estudiante Diplomante: DUSTIN EDWARD FRASER Tutor: ALBERTO SANCHEZ MATURELL Santiago de Cuba, Cuba, (Junio, 2010) 2010, Dustin Edward Fraser UNIVERSIDAD DE ORIENTE SEDE JULIO ANTOMIO MELLA FACULTAD DE INGENIERIA ELÉCTRICA DEP
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
This lab represents a hands-on exercise that implemented a penetration test of an organization's web application and server. It identified existing and possible vulnerabilities. It also carried out the actions needed to exploit a specific, high risk vulnerability. This exploitation identified the risk associated with it and the impact to the system. The methodology used combined the requirements of footprinting, fingerprinting, enumeration, penetration, access escalation, maintaining access, and covering tracks. This was incorporated into the cyber-kill chain methodology to take advantage of the vulnerable box.