Terence Broadbent's Projects
Various ANSI C programs.
Python script files to encode and decode BASE64/AES text strings via a 'Password Based Key Derivation Function' (PBKDF2)
Python script files to encode and decode BASE64/BLOWFISH text strings via a 'Password Based Key Derivation Function' (PBKDF2).
A python script file to encode and decode BASE64/DNA based text strings.
Various bash script files.
Java Battleships.
A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.
Java Bookshop using object orientation.
A python script file to decrypt BASE64/RC4 encrypted DNS exfiltration zip-file messages captured via Wireshark.
Use of a MC68HC11F1 (8-bit) micro-controller with ported visual studio ANSI C computer programming language to construct a sophisticated fire alarm system.
Use of labVIEW 2013 to construct a sophisticated smoke and heat detection system.
Various proof of concept java script files.
Various virtual instrument engineering workbench programs.
Shell script files to automatically configure a Linux firewall using Iptables.
Simple python script files for a chatroom/messenger style server and associated remote access client(s).
Python script file to crack encrypted Microsoft office files using a dictionary attack or a hash attack.
A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.
Python script file to crack encrypted .pdf files using a dictionary attack or a hash attack.
Java Petshop using inheritance.
Java PetShop using polymorphism.
Various project files.
Various python utility and script files.
A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap files, system executables, MFT tables, console keystrokes, screenshots and much much more.
RFID Security and Encryption.
A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phishing campaigns, extrapolate hidden data such as subdomains, security identifers, usernames and encrypted passwords; utilise pass the hash techniques, crack and auto import ntds.dit files, create on-demand golden and silver Kerberos tickets and... well, so much more...
Two python script files to perform Return-Oriented Programming (ROP) exploits on vulnerable ELF files.
A python script file that cracks RSA encrypted messages via a weak .pub key/.xml calculation by creating a fraudulent private key.
A python script file to perform OWASP’s automated audit tests against web application projects using SQLMAP.
Static Binaries