- Find a mentor
- Web Programming
- Mobile App Programming
- Programming Languages
- Data Science /Engineering
- Database /Operations
- Find a freelancer
- Find developer jobs
A Python Dev and a White Hat Hacker
No rating yet
Session / Job
For every 15 minutes
Automation / Cyber Security / Python Dev
- 4 years experience
I'm usually the "Python guy" in the office that my colleagues goto with their Python related problems. I've started doing Python work since high school, and have focused on different areas using Python.
- 6 years experience
I've been teaching myself all aspects of security related knowledge since high school. I've gained visions in this area and is able to develop security tools instead of toys. With extensive practice in CTFs and cooperate pentesting, I have granted plenty of expertise in Information Security. Currently I'm developing a threat intelligence web app.
WITCHHUNT HONEYPOT WEB APP
2018 Updates: - Added Counterattack Measures: JS payloads will be triggered on endpoints. 2017: Developed this web application for fast tracking online criminal activities in the future. Features the following compare to a traditional honeypot: - Setting up via any portable mobile device - Super fast setup process - Customize honeypot web page source code - Email notification when the trap is triggered - Pre-set the valid expiry time for the web page
With a team size of 4, we developed a Chrome Extension that allows the user to run NATIVE Python code and is able to interact with the web page (e.g. WhoIS Lookup). It also allows storage of the scripts and an online marketplace for script sharing.
Client: Australian University Hackathon Competition
HIGH ANONYMOUS PROXY POOL
Built using Python. It scrapes proxies from various websites and stores them into the sqlite database while tests the proxies using another thread, and clears them if they are unavailable or lacks anonymity. I've redesigned and refactored this project during December 2016 and have considered its usability, scalability and dependencies.
A proxy pool that scrapes free anonymous proxies and maintains its proxies' availability.
A CUI Struts2 Vulnerability Exploit
POSTS BY DANNY
Mining Deep Cyber Space Intelligence by Deploying Your Own Honeypots
This article is about the installation of honeypots using Cowrie, and different methods for collecting its data and visualizing it. This article also gives out ideas on various reasons a honeypot would be useful for exploring cyberspace and why we should all try it out.