From time to time, we develop software, scripts and guides to help with our day to day computer usage, as part of personal projects or during security competitions.
In this section we will be offering, free of charge (and thus with limited support), the different programs and scripts we believe could be useful for the wider Security/Open Source community.
SOFTWARE
BUGS CRYPTOGRAPHY
Various applications and cryptography libraries for Unix/Mac and Windows
2010 - 2015
UNIX, MAC, WINDOWS
See CRYPTO SECTION

SCRIPTS
Pineapple MarkV Plugin - DNSCHANGER
A plugin available on the pineapplebar directly from your pineapple device.
This can be used to change your pineapple DNS settings
January 2015
UNIX
dnschanger-1.2.tar.gz
Backup Sync
A script to backup specific folders into external hardrive with the ability to blacklist folders/files through keywords. Very fast, can be customised.
December 2014
UNIX, MAC
backup_sync.1.2.sh
PocketRC4.sh
This is a script implementing the PocketRC4 algorithm in Shell script. Please note you need at least Bash version 4.2 for this to work (this is because of one of the first line using "Declare", so this may not work on MAC OS X). More information can be found HERE
May 2015
UNIX
pocketrc4_v5.sh

GUIDES
Security Onion Guide
How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning.
May 2015
PDF
esguide_so_v4.pdf

PRESENTATIONS
ARE YOU RED TEAM READY?
A look at what makes a Red Team special versus more traditional security services such as Vulnerability Assessment and Penetration Testing.
SEPTEMBER 2018
PDF
DOWNLOAD
MOBILE SECURITY ASSESSMENT
Presenting an established assessment framework for mobile application and introducing some common tools to get started.
AUGUST 2018
PDF
DOWNLOAD
THE ART OF CTF
Introducing the concept of Capture the Flag and the free training benefits of participating at one.
AUGUST 2018
PDF
DOWNLOAD
OFFICE 365 SECURITY
A look at the hidden security features of Office 365 as well as best practices to secure it.
JULY 2018
PDF
DOWNLOAD
DATA PROTECTION
A look at how to protect your data and why it is important.
JUNE 2018
PDF
DOWNLOAD
INTRODUCTION TO CYBER FORENSICS
Looking at the different steps involved in Cyber Forensics and an overall framework to guide you through.
MAY 2018
PDF
DOWNLOAD
CYBER MEDIA AS A CYBER WEAPON
A look at how much data can easily be gathered from social media and how it can be applied as part of a cyber attack.
APRIL 2018
PDF
DOWNLOAD
HOW TO SETUP A HOME IDS
An overview of what an IDS is and how to get started to set one up at home.
MARCH 2018
PDF
DOWNLOAD
STANDARDS AND REGULATIONS
A quick introduction to ISO 27001, 27002, FFIEC, GDPR and Mauritius DPA 2017.
MARCH 2018
PDF
DOWNLOAD
WIFI SECURITY EXPOSED
Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
FEBRUARY 2018
PDF
DOWNLOAD
OPEN SOURCE IDS
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
NOVEMBER 2017
PDF
DOWNLOAD