Giter Club home page Giter Club logo

Hi there 👋🤖💫

  • 🔭 I completed my research on cybersecurity skills as a driver for economic growth in developing countries. I hope these countries find work valuable to advancing national capabilities.

  • $$$ I'm currently working on a 2nd Ph.D. - in cybersecurity in financial institutions. https://www.linkedin.com/pulse/financial-cybersecurity-assessing-critical-cost-fraser-casp-sscp/

  • 🌱 I’m currently learning how to conduct mixed methods research as I advance current research and work.

  • 👯 I’m looking to collaborate on big data and cybersecurity analytics systems.

  • 🤔 I’m looking for help with developing AI models for anomaly and fraud detection. In addition, developing neural networks for occupation data.

  • 💬 Ask me about analytics, cybersecurity, software engineering, programming, reverse engineering, or relevant topics.

  • 👋 Recently got a financial institution SOC 2 Type 2 for a complex trading platform in 30 days - using the three-lined defense model and ITGC as lenses to test and remediate controls.

  • 📫 How to reach me: LinkedIn: https://www.linkedin.com/in/drdustinfraser/ Website: https://1gcyber.com Credly: https://www.credly.com/users/dr-dustin-fraser/badges

  • ⚡ Fun fact: Hablo español, así que siéntete libre de conectarte.

Research: 🌱Cybersecurity skills can be an engine of economic growth in developing countries 🌱Financial Cybersecurity - Assessing Critical Applications Cost and Cybersecurity Risk Management 🌱Future Research: Cybersecurity Skills as A Driver for Economic Growth in Developing Nations 🌱Gangs & Delinquent Youth Avoidance: Cybersecurity Education for Social Transformation (EST) in New York City and State 🌱Cybersecurity Knowledge and Skills

dutchand/dutchand

image

image

image

Advanced AI real estate tools that provide significant advantages in the property market

image

special

DrED's Projects

adversary_emulation_library icon adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

attack-control-framework-mappings icon attack-control-framework-mappings

Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.

attack-navigator icon attack-navigator

Web app that provides basic navigation and annotation of ATT&CK matrices

attack_to_cve icon attack_to_cve

A methodology for mapping MITRE ATT&CK techniques to vulnerability records to describe the impact of a vulnerability.

azuread-attack-defense icon azuread-attack-defense

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.

billymadisonwalkthrough icon billymadisonwalkthrough

The lab was focused on the Billy Madison exercise which sought to capture the flag: find his 12-grade final exam project. It included following the walkthrough by those who completed the exercise. Students were required to setup the internal network, install the Billy Madison OS on a Virtual Machine, conduct a reconnaissance (foot printing, fingerprinting and enumeration). The scope was limited to the walkthrough as provided by the lab details. The tools and methodology vary based on the student's interest. The attacker machine was Kali, and the target was the Billy Madison. The Billy Madison system is a project based on the plot that an attacker named Erick Gordon plans to take over the Madison Hotels. To achieve this, he has installed malware on Billy's computer just before the two were set to face off in an academic decathlon. Billy has to regain control of his system and decrypt his 12th grade final project or he will not graduate from high school. If not, he fails, loses the decathlon, and loses succession to head of the Madison Hotels. The goal of this lab was to follow the g0blin's walkthrough.

crits icon crits

CRITs - Collaborative Research Into Threats

docs icon docs

The open-source repo for docs.github.com

drone icon drone

Drone is a Continuous Delivery platform built on Docker, written in Go

fast_scan.py icon fast_scan.py

This script use the fast scan of rustscan with the deep scan of nmap

frostbyte icon frostbyte

FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads

got-your-back icon got-your-back

Got Your Back (GYB) is a command line tool for backing up your Gmail messages to your local computer. It uses the standard IMAP protocol but also takes advantage of some custom Gmail IMAP extensions. For help with GYB, see the Getting Started Guide at https://github.com/jay0lee/got-your-back/wiki

icssploit icon icssploit

ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python

illegal-hotel-inspections icon illegal-hotel-inspections

Through a Freedom of Information request, WNYC obtained records from the Mayor's Office of Special Enforcement of 2,684 inspections looking for illegal short-term rental activity in New York City. The inspections occurred from October 2013 through April 2015.

information-system-for-the-management-and-control-of-the-resources-and-administrative-services- icon information-system-for-the-management-and-control-of-the-resources-and-administrative-services-

UNIVERSIDAD DE ORIENTE SEDE JULIO ANTOMIO MELLA FACULTAD DE INGENIERIA ELÉCTRICA DEPARTAMENTO DE INFORMÁTICA SISTEMA DE INFORMACIÓN PARA LA GESTIÓN Y CONTROL DE LOS RECURSOS Y SERVICIOS ADMINISTRATIVOS DEL CIROA Tesis para optar al grado de Ingeniero en Informática Estudiante Diplomante: DUSTIN EDWARD FRASER Tutor: ALBERTO SANCHEZ MATURELL Santiago de Cuba, Cuba, (Junio, 2010)  2010, Dustin Edward Fraser UNIVERSIDAD DE ORIENTE SEDE JULIO ANTOMIO MELLA FACULTAD DE INGENIERIA ELÉCTRICA DEP

mrrobotwalkthrough icon mrrobotwalkthrough

This lab represents a hands-on exercise that implemented a penetration test of an organization's web application and server. It identified existing and possible vulnerabilities. It also carried out the actions needed to exploit a specific, high risk vulnerability. This exploitation identified the risk associated with it and the impact to the system. The methodology used combined the requirements of footprinting, fingerprinting, enumeration, penetration, access escalation, maintaining access, and covering tracks. This was incorporated into the cyber-kill chain methodology to take advantage of the vulnerable box.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.