OWASP Mth3l3m3nt Framework
The purpose of this project is to provide a platform to enable more flexible testing especially in aspects regarding to web security and the OWASP top 10 threats to web applications. It fosters on ease of use and flexibility.
This is a number of projects that have RATs utilising a PHP backend and executable client. They are fully decoded with source provided. For more information
0x88 Exploit Pack
This project was not originally by me , All i did was decode the actual exploit pack to enable looking under the hood for researchers so that they understand about how attacks were done using the exploit pack.
What’s in a lab that which we call malware, by any other name would still be as malicious. I made a small application that will emulate some of the attacks by the viruses in a slightly controlled manner just to give you an understanding of what it takes to build viruses.
Munir Njiru Njenga is a Cyber Security Consultant and researcher. He mainly focuses on malware analysis, web and mobile based applications testing and methodologies. His efforts in this space have been recognized earning him an award in 2015 WASPY (Web Application Security People of the Year) awards winning in two categories within the Africa continent; Global/Growing and Innovation/Sharing
Munir is also a project leader for the OWASP Project dubbed "OWASP Mth3l3m3nt Framework" which is an exploitation framework that aids in a number of activities and uses minimal resources as all it needs is a webserver which can even be run from an android phone without a problem and optionally a database server.
Red Team Assessments