A group of ethical hackers sitting at their stations aengaged in various pentesting tasks. This is the cover photo for the publication, Red

Johnny Watts Recent Open Source Projects

Recent Open Source Projects

These are some of my recent open source projects.  I've written a variety of documents, applications and scripts in several coding languages mostly focusing on website security and network intrusion detection and prevention with a few red team security tools. If you are interested in contributing to these or any of my other projects, please see the individual guidelines in each repositiory for details. See the Full list of all of my project repositories. You can also Sponsor my work.
A group of ethical hackers sitting at their stations aengaged in various pentesting tasks. This is the cover photo for the publication, \

Red Team Manual: Linux Systems

This comprehensive guide aims to provide a standardized approach to ethical hacking and promote best practices within our red team. By following this guide, we can ensure a uniform and consistent methodology across the entire team.

A person typing commands into akeyboard at the behest of an unscrupuloas remote access scammer. This is the cover photo for the publication, Protecting Yourself from Remote Access Scams by Johnny Watts

Protecting Yourself from Remote Access Scams

Explore the world of refund and remote access scams in this comprehensive bulletin authored by a 30-year cybersecurity veteran. Learn about their history, tactics, prevention, and reporting strategies.

A critical vulnerability in XAMPP's default Apache service settings on Windows systems jeopardizes integrity, confidentiality, and availability. Discovered by Security Researcher Johnny Watts, this flaw poses severe security risks. The report offers in-depth analysis, PoC, video demo, and mitigation steps.

Critical Security Vulnerability in XAMPP for Windows Default Apache Service Configuration

A critical vulnerability in XAMPP's default Apache service settings on Windows systems jeopardizes integrity, confidentiality, and availability. This flaw poses severe security risks.

A screenshot of the digEm Software utility by Johnny Watts

digEm

digEm is a simple shell script which uses the dig utility for DNS enumeration.  One quick command automates full DNS enumeration. Requires the Dig utiility.

A screenshot of the KPots Software utility by Johnny Watts

K-Pots

KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning.

A screenshot of the K S.W.A.T. Software utility by Johnny Watts

K S.W.A.T PHP Website Security

K S.W.A.T. Security blocks millions of known bad actors and protects PHP driven websites from some of the most common types of threats and attacks.

A screenshot of the K-Sploit Software utility by Johnny Watts

K-Sploit

 KSploit is a red team tool for common metasploit tasks such as generating shells, payloads, listeners and persistence scripts on the fly.

A screenshot of the KDG Admin Content Management System by Johnny Watts

NetSentinel

NetSentinel is a Python-based red team reconnaissance framework designed for stealthy internal enumeration, service discovery, and lateral movement preparation.

A screenshot of the Not So Simple PHP Command Shell red team utility by Johnny Watts

The Not So Simple Command Shell

A red team tool for on target enumeration. Gather and exfiltrate information. Upload tools or msvenom payloads for further access.

Like what you see?

 Hire me

 

An animated image representing bots being counted with the text: One bot. Two bots. Three bots. Four. Each one counts a little more. johnny5
johnny5
johnny5
johnny5