allenwest24
Security Researcher II @ Akamai SIRT Graduate Student @ Carnegie Mellon
Akamai SIRTDenver, CO
Pinned Repositories
CV
This is my full CV of work.
Ethical-Hacking-Toolbox
My collection of homemade ethical hacking tools. Includes a Key Logger, Fuzzer, Mac Changer, Network Scanner, and more.
Experience-Gap-Indentifier
A tool that looks at your resume and compares it to various job postings you find interesting, then identifies technologies you should get experience with.
File-Infector-Virus
Created a self-replicating file-infector virus that will copy itself to a victim within the directory it is executed in. Whenever an infected file is run, it will infect another file in the same directory and then excute its normal functionality. The payload is just a print statement.
HackTheBox
HackTheBox is hard. Here are some write-ups for machines I have pwned.
Manipulating-System-Calls
A demo on how you can manipulate PATH to run malicious versions of syscalls.
NU-AIR
The NU And Improved Registration script for Northeastern University.
Pentesting-iOS-Applications
My notes for the iOS pentesting course on Pentester Academy for my future reference and maybe yours..
QuizMe
A tool that leverages ChatGPT through the OpenAI API to generate review questions based on input text.
Sudoku-Speed-Solver-AI
Creating the fastest Sudoku solver possible. Solves 'Evil' rated puzzles in 146.327 μs (0.0001 seconds)
allenwest24's Repositories
allenwest24/File-Infector-Virus
Created a self-replicating file-infector virus that will copy itself to a victim within the directory it is executed in. Whenever an infected file is run, it will infect another file in the same directory and then excute its normal functionality. The payload is just a print statement.
allenwest24/Ethical-Hacking-Toolbox
My collection of homemade ethical hacking tools. Includes a Key Logger, Fuzzer, Mac Changer, Network Scanner, and more.
allenwest24/NU-AIR
The NU And Improved Registration script for Northeastern University.
allenwest24/Manipulating-System-Calls
A demo on how you can manipulate PATH to run malicious versions of syscalls.
allenwest24/Pentesting-iOS-Applications
My notes for the iOS pentesting course on Pentester Academy for my future reference and maybe yours..
allenwest24/Clipboard-Logger
Checks what is on the target marchine's clipboard every 5 seconds and if it's new adds it to a log. This log is emailed to the specifed address every 5 minutes.
allenwest24/Fuzzer
Takes in an XML file and a program, and will run different inputs, returning the set of inputs that return error messages. This info can be used to manipulate privleges or functionality.
allenwest24/Key-Logger
This will send a string of all keys pressed on the target machine to the specified email every 5 minutes.
allenwest24/Mac-Changer
Changes our mac address to one that a certain router will accept
allenwest24/My-Unix-Shell
Recreated the Unix shell using hashmaps and a home-made tokenizer.
allenwest24/Secure-Password-Generator
This password generator is designed to generate a secure, memorable password using the XKCD method.
allenwest24/Cache-Oblivious-Algorithms
Cache-Oblivious algorithms are algorithms deisgned to take advantage of a CPU cache without having the size of the cache as an explicit parameter.
allenwest24/Adventures-in-SQL
I am documenting my progress in SQL and SQL injections so that I can pull from this at a later date.
allenwest24/ARP-Poisoner
Used in MITM exploits.
allenwest24/Buffer-Overflow
Buffer Overflow of a vulnerable program that doesn't properly manage its buffer.
allenwest24/Buffer-Overflow-Demo
This is a walkthrough for buffer overflows, slowly adding common defenses and altering our exploit to get around them.
allenwest24/Data-Structures
Sorting with Vectors and Hashmaps
allenwest24/Email-AutoSend
In my keylogger project I used python libraries to send an email to myself every five minutes off of the target computer. I felt this would be a good project to separate as well.
allenwest24/Form-Validation
Practicing the concept behind form validation and then I will do further research to make it SQL injection proof.
allenwest24/HackerRank
I do this when I'm bored.
allenwest24/InteractiveAnimator
A java swing animator for parsing, interpreting, manipulating, and animating user described animations from .txt files.
allenwest24/Matrix-Multiply
Using Matrix Multiply as a test subject for performance evalutaions on different languages and optimization tactics.
allenwest24/Network-Scanner
My version of netdiscover
allenwest24/OverTheWire-WriteUps
My solutions to the popular hacking site OverTheWire: War Games.
allenwest24/Parallel-Sort
Sample sort is a parallel version of quicksort.
allenwest24/Quicksort
Created quicksort in C and translated into Assembly
allenwest24/Remote-Buffer-Overflow
Extension from the project Buffer Overflow to now work on a remote vulnerable server.
allenwest24/SecurityPlus
My notes for the Security+ cert prep course for my reference and maybe yours..
allenwest24/Timsort
Comparing Timsort to common sorting algorithms like mergesort and insertionsort.
allenwest24/Tokenizer
Tokenizer that will take command line entries and separate them by commands, arguments, and flags reguardless of spacing or piping.