Skip to content
View aN0mad's full-sized avatar

Highlights

  • Pro

Block or report aN0mad

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
aN0mad/README.md

Hi there 👋

Header

I am a cyber security professional who uses programming for extending capabilities and automation. Some titles I have held over the course of my career have been:

  • Computer booper
  • Perpetual noob
  • Professional googler
  • Certified Checkbox Unchecker

Languages and Technologies



Stats

Top Langs

Popular repositories Loading

  1. analysisTools analysisTools Public

    Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Honig and Michael Sikorski

    Python 57 8

  2. CVE-2019-16278-Nostromo_1.9.6-RCE CVE-2019-16278-Nostromo_1.9.6-RCE Public

    Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.

    Python 6 1

  3. AutoRecon AutoRecon Public

    Forked from AutoRecon/AutoRecon

    AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.

    Python 3

  4. myriad myriad Public

    A MVP golang multi/shell/handler.

    Go 3 2

  5. autoNmap autoNmap Public

    A shell script wrapper around nmap that runs an initial and then a targeted nmap scan.

    Shell 2 1

  6. at-ps at-ps Public

    Forked from SpecterOps/at-ps

    Adversary Tactics - PowerShell Training

    PowerShell 1