alifa2try
I am a cyber security trainer and consultant who help students to acquire cyber security knowledge & skills and companies to secure their data.
Phoenyx AcademyKano, Nigeria
Pinned Repositories
awesome-cpp
A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
enhanced-argumentation-based-reasoner
Enhanced Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks"
h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
IoT_Project
This repo has been developed as part of the "Internt of Things" course at Politecnico di Milano. The project aims to design and implement a software prototype for a social distancing application using TinyOS, Node-RED and IFTTT.
Learn-Ethical-Hacking-from-Scratch
Learn Ethical Hacking from Scratch, published by Packt Publishing
mail-hunter
Mail Hunter is a tool that gathers e-mails from all the pages on a target website
Malicious-Python-3-Programming-for-Ethical-Hackers
Offensive Security Python scripts based on my course "Learn Ethical Hacking with Python 3 from Scratch" on Phoenyx Academy
master-thesis
My master thesis: Ethical hacking of a smart home alarm system.
phunter
Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the moment.
RPL_Attack_Files
This repo will contain modified files from Contiki 3.0 necessary to carry out RPL attacks.
alifa2try's Repositories
alifa2try/ASSET
A centralized (SDN-paradigm) controller to monitor IoT networks. In this implementation, it cooperates with Cooja, the contiki emulator to monitor RPL networks
alifa2try/contiki-standard-extra-functions
A standard contiki 3.0 with some extra functions and printouts to cooperate with an SDN-like external controller
alifa2try/Apache-HTTP-Server-Module-Backdoor
:japanese_goblin: A Backdoor For Apache HTTP Server Written in C
alifa2try/contiki-ng-attacks
alifa2try/contiki-malicious-controller-aware-dodag-inconsistency
alifa2try/contiki-malicious-controller-aware-version-attack
Contiki-3.0 with a malicious node only. To be used as an attacker with an SDN-like external controller
alifa2try/contiki-malicious-controller-aware
contiki-3.0 with a malicious node only. To be used as an attacker with an SDN-like external controller
alifa2try/enhanced-argumentation-based-reasoner
Enhanced Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks"
alifa2try/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
alifa2try/cs-video-courses
List of Computer Science courses with video lectures.
alifa2try/TorBot
Dark Web OSINT Tool
alifa2try/dissecting-discrete-mathematics-with-python
This is a code repository for the book "Dissecting Discrete Mathematics with Python"
alifa2try/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
alifa2try/eh_contiki
Contiki framework for Energy Harvesting
alifa2try/threat-INTel
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
alifa2try/focal
Focal is a tool for extracting metadata from documents.
alifa2try/wormhole
A wormhole attack implementation for Contiki.
alifa2try/pyswip
PySwip is a Python - SWI-Prolog bridge enabling to query SWI-Prolog in your Python programs. It features an (incomplete) SWI-Prolog foreign language interface, a utility class that makes it easy querying with Prolog and also a Pythonic interface.
alifa2try/Malicious-Python-3-Programming-for-Ethical-Hackers
Offensive Security Python scripts based on my course "Learn Ethical Hacking with Python 3 from Scratch" on Phoenyx Academy
alifa2try/flux_led
A utility for controlling Flux WiFi Smart LED Light Bulbs
alifa2try/flowblade
Video Editor for Linux
alifa2try/mail-hunter
Mail Hunter is a tool that gathers e-mails from all the pages on a target website
alifa2try/sentiment-argument-mining
Sentiment analysis and argumentation mining in UN Security Council (UNSC) Speeches (https://arxiv.org/abs/1906.10969); argumentation mining uses US Election Debate corpus for training purposes.
alifa2try/contiki-malicious
contiki 3.0 with only a malicious node to be used as an attacker. Dont use this contiki for legitimate nodes
alifa2try/Canary-1
A Simple Argument Mining Library
alifa2try/IoT_Project
This repo has been developed as part of the "Internt of Things" course at Politecnico di Milano. The project aims to design and implement a software prototype for a social distancing application using TinyOS, Node-RED and IFTTT.
alifa2try/nigerian-pentest-tools
A list of open source pentest tools created by Nigerian authors
alifa2try/phunter
Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the moment.
alifa2try/IoT-Digital-Forensics-Course
Free IoT Digital Forensics Course with hands-on labs
alifa2try/Pentesting-Toolkit
🏴☠️ Tools for pen-testing, CTFs & wargames. 🏴☠️