Name: Mohamed Amine Guesmi
Type: User
Company: Looking for a job in IT
Bio: Tunisian Junior Security Researcher specializing in low-level applications, DevSecOps,WEB3, networking, and advanced threat hunting.Proficient in MERN stack DEV
Twitter: da_crypto_freak
Location: Tunisia
Blog: mailto:[email protected]
Mohamed Amine Guesmi's Projects
Welcome to the Malware Analysis Training Kit, a comprehensive resource designed to help you understand and analyze malware in .NET and Java environments. This repository includes setup guides, principles, task completion guides, and practical exercises to enhance your malware analysis skills.
A GitHub Action for running the OWASP ZAP Full scan
This is an AD pentest tools collection
Adrena Crypter source
This repository contains a collection of reports and documents related to various Advanced Persistent Threat (APT) groups, with a specific focus on Iranian APT activities. These reports provide detailed analysis, incident reports, and findings on the tactics, techniques, and procedures (TTPs) employed by these threat actors.
Attempt to reverse 0xcheats.net MTA cheat
This repository contains the source code for Babyk Ransomware, a sophisticated piece of malware designed for educational and research purposes. This project aims to provide security researchers and analysts with a comprehensive understanding of ransomware behavior, encryption techniques, and attack vectors.
A massively parallel, high-level programming language
Binders sources
Blacknet source
Botnets sources
Some files for bruteforcing certain things.
Bug Bounty Web and API Payloads
Collect crash reports, triage, and estimate severity.
conti locker ransomware source code leak
This is a course materials repo , ENJOY !
CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is developed by the malware-as-a-service operator known as "EVLF DEV" and has been actively used in various cyber-attacks.
CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is developed by the malware-as-a-service operator known as "EVLF DEV" and has been actively used in various cyber-attacks.
Crypters-sources
32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc
This is an enhanced Darkgpt
A Minimalistic Wrapper for IndexedDB
exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure
a comprehensive collection of exploits, scripts, and tools designed for testing and exploiting vulnerabilities in various software and hardware systems. This project supports multiple programming languages and provides resources for both experienced and novice security professionals.
HelloKitty ransomware source code repository