Security Arsenal

Projects & Tools

Advanced offensive security tools built for penetration testing, red teaming, and security research

Production Tools

Battle-tested security tools used in real-world assessments

🔍

Filo

🛡️

Forensic Intelligence & Learning Operator - Battle-tested file forensics platform for security professionals. Transforms unknown binary blobs into classified, repairable, and explainable artifacts with offline ML learning. Features deep file analysis, smart format detection, polyglot detection, CPU architecture identification, and 90+ supported formats.

Python Production ML-Powered
Digital Forensics Machine Learning File Analysis CTF Tool
🌊

CoCo

🔐

Multi-protocol covert channel framework supporting ICMP, DNS, and HTTP with 7 evasion modes. Features ChaCha20 encryption for secure data exfiltration and communication. Ideal for red team operations and testing data loss prevention systems.

Python Encrypted Multi-Protocol
Covert Channels Data Exfiltration Evasion Encryption
🐚

ShellHooks

💻

Comprehensive reverse shell generator supporting 20+ languages with 66+ variants. Available as both CLI and web interface for quick payload generation during assessments. Includes customization options for IP, port, and encoding methods.

Multi-Language CLI + Web 66+ Variants
Reverse Shells Payload Generation Pentesting Web Interface

GTFOBins-CLI

🔓

Linux privilege escalation reference tool cataloging 366 binaries with 1400+ exploitation techniques. Essential CLI utility for penetration testers and security researchers. Quickly search and reference privilege escalation methods during engagements.

Python 366 Binaries 1400+ Techniques
Privilege Escalation Linux Security Reference Tool CLI

Additional Security Projects

Enumeration tools, attack frameworks, and utility scripts

Enumeration Suite

📋

Collection of enumeration tools for web applications, networks, and systems. Automated scripts for information gathering and vulnerability discovery.

Enumeration Information Gathering

Wireless Attack Tools

📡

WiFi and Bluetooth attack frameworks for security testing. Includes deauth attacks, packet injection, and wireless network analysis capabilities.

WiFi Bluetooth Wireless

ICMP Transfer Tool

📦

Stealth data transfer utility using ICMP packets. Useful for bypassing firewall restrictions and exfiltrating data through ping traffic.

ICMP Data Transfer Stealth

AI Injection Testing

🤖

Framework for testing AI chatbot security and prompt injection vulnerabilities. Research-focused tool for identifying weaknesses in LLM applications.

AI Security Prompt Injection

Malware Analysis Suite

🦠

Tools for static and dynamic malware analysis. Includes automated sandbox environment and behavior analysis scripts.

Malware Analysis Sandbox

Web Exploit Kit

🌐

Collection of web application exploitation tools. SQL injection, XSS, CSRF testing utilities for comprehensive web security assessments.

Web Security Exploitation

Upcoming Projects

Currently working on new security tools and enhancements

Advanced Security Tools

🚀

Actively developing new security tools and frameworks with focus on container security, advanced exploitation techniques, and automated vulnerability analysis. Check back regularly for updates on new releases.

Active Development Research Phase
Container Security Automation Research
📚

Current Learning

🎯

Improving Python development skills and exploring containerization with Docker and Kubernetes. Completed RH124 and RH134 of RHCSA at Red Hat Academy. Building expertise in cloud-native security and infrastructure automation.

Continuous Learning
Docker Kubernetes Python RHCSA

Interested in Collaboration?

I'm always open to discussing security research, tool development, and collaborative projects.