Isaac Newton (@Wobomba)

Top repositories

1

Reconnaissance_Tools

A script on active scans and passive scans run to gather information on systems in the Cyber Kill Chain.
Python
2
star
2

Unitary-Transformations

Transformation made using the SVD algorithm for decomposition when U and V transpose are unitary and sigma is the diagonal matrix
Jupyter Notebook
1
star
3

React-CRUD

JavaScript
1
star
4

Stock-Predictor

Machine learning project to predict the sales for the next period of years
Python
1
star
5

Reverse-Shells

A reverse shell to establish a connection to a server through a client and vice versa
Python
1
star
6

CMS-Exploit

An exploit for CMS in order to perform Remote Code Execution (RCE) through the design manager flaw in the system
Python
1
star
7

Linux-Privilege-Escalation-Script

Performing Linux Privilege Escalation
Shell
1
star
8

Advertising-

Python
1
star
9

secondsug-main

JavaScript
1
star
10

SSH

Passing SSH private keys into John the Ripper format for cracking
Python
1
star
11

React-Nav

JavaScript
1
star
12

Machine-Learning-for-Security

Jupyter Notebook
1
star
13

AlgoTest

Python
1
star
14

Basic-Scripting-Challenge

PowerShell
1
star
15

RSS

An application that maps to different URL's with a test to speech ability
Java
1
star
16

The-Hive

Analysis of captured network traffic after suspicion of data exfiltration on a network. The traffic corresponds to FTP connections that were established. IntroSecCon 2020 CTF challenge
1
star
17

YARA-Test

A glance at malware analysis using Yara to identify and classify different types of malware
YARA
1
star
18

Neural-Network

Short code on how to create a neural network without tensor flow and keras
Python
1
star
19

Inventory-Management

Mobile Application that acts as an Inventory with POS and API's
Java
1
star
20

Glass-classification

A django project using a machine learning model to determine what category of glass is being used basing on the materials it is composed of
Python
1
star
21

ICS

A cyber security framework housing key tools used to perform common attacks on systems, websites, and reconnaissance on companies
1
star
22

Image-Compression

Performing image compression using the singular value decomposition algorithm specifically implementing an economy SVD to compress the image. It also has a plot of singular values and the cumulative singular values on the energy used at different r nodes to compress the image
Jupyter Notebook
1
star
23

Capture-The-Flag---THM

A spectrogram is a visual representation of the spectrum of frequencies of a signal as it varies with time. When applied to an audio signal, spectrograms are sometimes called sonographs, voiceprints, or voicegrams. When the data is represented in a 3D plot they may be called waterfalls.
1
star
24

Fuzzer

Buffer Overflow Exploitation Scripts that are customizable in Immunity Debugger and Putty, run alongside mona configurations to perform either stack-based, heap-based, or format string buffer attacks on computing memory
Python
1
star
25

Socket-Programming

Connecting multiple clients to a server using python3 sockets. It shows how to send messages from clients to servers and from servers to clients. Its also possible for one to host the socket locally or globally across the internet so that anyone can access it. It uses the python3 module and threading module.
Python
1
star