slacker007 - Overview

Hi there šŸ‘‹ here is a overview of my OSS.

šŸ“Š GitHub Statistics

GitHub Stats GitHub Streak

Top Languages Activity Graph

šŸ Contribution Snake

Snake animation


šŸš€ Current Development Status

Last Updated: GitHub last commit

Active This Week:

  • šŸ”„ Working on private offensive security modules
  • šŸ Python predictive search implementations
  • šŸ”’ Private repository contributions: Check contribution graph above

šŸ’” Note: My contribution graph above includes all activity from private repositories. Each green square represents real commits across all my projects!

About Me:

  • šŸ”­ I’m currently working on offensive modules for Quasar Rat (CSharp)
  • 🌱 I’m currently learning predictive search techniques (Python)
  • šŸ‘Æ I’m looking to collaborate on anything fun/new/cool
  • šŸ“« How to reach me: slacker007.dev@gmail.com
  • ⚔ Fun fact: I'll get back to you on this one.....

⚔ Cyber Security Research & Tools

Over the years I have worked on various projects ranging from small research projects to team based projects in support of OSS. The following work spans over 10 years of OSS development, training, and research. Most of the code is research for other operational projects for cyber threat hunting, red teaming, pentesting, and IR.

🌱 Courses Authored

  • SOC Immersion Training (SIT) - (2018) Co-Author, SIT is designed for intermediate-level cybersecurity and hunt team analysts to increase their functional knowledge of analytical thinking and concepts. By using demonstrated real-world attack methodologies in a step-by-step manner, SIT provides analysts with an in-depth understanding of how to analyze attack TTPs and the ability to construct complex IOCs derived from environment-specific threats and constraints.

šŸ’¬ Confrence Talks & Research

Red Team Infrastructure

Cyber Security Scripts/Tools

  • BRO - Network Security Monitoring - Collection of Bro and bash scripts that when run from the same directory on a Linux distro with bro installed; will pull information such as active HTTP conns, FTP conns, DNS Request/Responses, And a live(-20 seconds) feed for files transmitted. It also carves the various types of files at the same time. They can be run against snort logs or pcaps.
  • NodeHunter - Python wrapper around NMAP api to perform quick and dirty node and service discovery and enumeration.
  • CS-Beacon-Detector - (2015) Custom Sniffer that was designed to work against Cobal Strike DNS Beacons. It listens for DNS beacons and analyzes the URL, Request, and multiple specific fields within the payload. It performs some correlation to determine the validity of requests and replies.
  • DNShunter - DNShunter is a python based module that is written for a Hunt Framework & custom Linux distro built for hunt operations. Currently it reads in .pcap files and extracts the DNS Queries and Answers. In addition to extracting the queries & answers, it also performs a geo-lookup of the domains & the associated IP's.
  • S3 - Splunk Sexy Six - Open Source Windows Security Event Log Correlation and Analysis Tool
  • VDNS - VDNS is a python application that parses Bro's dns.log file and injests the results into the neo4j database for visual analysis
  • OFF-ToolKit - Project created to gather host based forensic data to later use during an offensive engagement
  • NetInfo - Quick and dirty python script to gather network information from windows registry.

Agents