Skip to content
View anpa1200's full-sized avatar

Block or report anpa1200

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
anpa1200/README.md

Andrey Pautov

Cybersecurity Researcher | AI-Powered Security Tooling | Malware Analysis | CTI | Offensive Security Research

I build practical cybersecurity tools, malware-analysis workflows, threat intelligence research, and security testing utilities designed for analysts, defenders, researchers, and security engineers.

I focus on:

  • AI-powered security automation
  • Malware triage and static analysis
  • Cyber Threat Intelligence (CTI)
  • Offensive security research
  • Detection-oriented defensive engineering

Table of Contents


About Me

I am a cybersecurity researcher and builder focused on creating practical, research-backed tools and workflows that help security teams move faster from raw artifacts to actionable insight.

This GitHub profile includes:

  • AI-assisted security tooling
  • Malware-analysis utilities
  • Static-analysis pipelines
  • CTI research repositories
  • Security testing tools
  • Practical research and lab-oriented projects

I also publish technical cybersecurity articles and research on Medium:

Medium: medium.com/@1200km


Featured Projects

AI-powered static analysis framework for Android APK files. Combines YARA rule matching, semantic component name analysis, weighted threat scoring, VirusTotal cross-validation, and multi-provider LLM classification (Claude, OpenAI, Gemini, or local Ollama) — producing MITRE ATT&CK-mapped reports and Frida instrumentation scripts entirely in the terminal. No sandbox, no uploads required.

📖 Full guide on Medium

AI-assisted malware reverse engineering debugger. Combines Capstone disassembly, FLIRT signature matching, automatic malware pattern detection (XOR loops, stack strings, API hashing, RDTSC timing, direct syscalls), per-function CFG visualization, and Claude AI analysis — all in a live terminal UI. Optional Frida dynamic mode adds runtime register snapshots, memory diffs, automatic unpacking detection, and network traffic capture. Generates HTML reports with inline CFG SVGs, YARA rules, and JSON export for SIEM/SOAR. Supports remote frida-server for INetSim-isolated sandbox workflows.

📖 Full engineering walkthrough on Medium

AI-powered multi-cloud security scanner for AWS and GCP. Scans 9 AWS modules, 7 GCP modules, and 4 external modules; routes findings through Claude, GPT-4o, or Gemini for attack chain analysis and prioritized reports. Deploys to AWS ECS Fargate or GCP Cloud Run Job via a single interactive wizard.

📖 Full engineering walkthrough on Medium

AI-powered host vulnerability assessment and security auditing in a Dockerized workflow.

Command-line CVSS v4.0 enrichment tool. Takes CVE IDs and produces CVSS-BTE scores — Base + Threat + Environmental — by pulling live data from CISA KEV, EPSS, and NVD. Outputs severity bands, SLA recommendations, and full BTE vector strings. Six built-in asset profiles: internet_facing, internal_vlan, isolated_ot, dev_test, healthcare_ehr, pci_payment. CSV and JSON export.

📖 CVSS v4.0: The Practical Field Guide for Vulnerability Management

Open-source cyber threat intelligence reports with evidence-labeled assessments, SOC-oriented guidance, and defensive research.

One-command static malware analysis pipeline: triage, strings, PE imports, unpacking, and LLM-ready reporting.

Modular malware packer detection and unpacking workflow for PE and ELF samples.

PE import table analysis for malware triage and reverse-engineering support.

String extraction and analysis for binaries to surface indicators, suspicious content, and analyst-relevant context.


Repository Portfolio

AI-Powered Security

AI-assisted malware reverse engineering debugger powered by Claude. Full pipeline: static PE/ELF parsing → recursive-descent disassembly → FLIRT library identification → malware pattern detection → CFG construction → Claude AI function explanation → optional Frida dynamic instrumentation.

Key capabilities:

  • FLIRT matching — identifies msvcrt, zlib, OpenSSL functions; skips AI for them
  • 8 malware patterns — XOR decryption loops, stack strings, API hash resolution, RDTSC timing checks, direct syscall stubs, NOP sleds, null-safe XOR, Base64 table references
  • CFG visualization — basic block decomposition; text in TUI, inline SVG in HTML reports
  • Frida dynamic mode — register/memory snapshots, memory diffs, unpacking detection (VirtualProtect RWX→RX), Winsock + WinInet traffic capture
  • Remote frida-server (--frida-host) — run AIDebug on host with real internet while malware runs in INetSim-isolated VM
  • Reporting — self-contained HTML report, YARA rules, JSON export for SIEM/SOAR

Supports PE32/PE64/ELF across x86, x86-64, ARM, AArch64, RISC-V.

📖 Article: I Built an AI-Powered Malware Debugger That Explains Every Function It Sees

AI-powered multi-cloud security scanner covering AWS (9 modules) and GCP (7 modules) plus external endpoint scanning. Uses Claude, GPT-4o, or Gemini to synthesize findings into attack chains and prioritized remediation. Deploys serverlessly to AWS ECS Fargate or GCP Cloud Run Job via a unified interactive wizard (wizard.sh).

Runs a full assessment in 2–4 minutes. Costs ~$0.01–$0.15 per scan depending on model. 125-test suite, zero live cloud calls in CI.

📖 Article: StratusAI: I Built an AI-Powered Cloud Security Scanner for AWS and GCP — Here's Everything

AI-powered host vulnerability assessment and security auditing platform designed to support practical security review workflows.


Cyber Threat Intelligence

CVSS v4.0 enrichment pipeline: pulls live NVD vectors, checks CISA KEV, queries EPSS, applies asset environmental profiles, and outputs CVSS-BTE vectors with severity bands and SLA recommendations. Single dependency (requests), six built-in profiles, CSV + JSON output.

📖 CVSS v4.0: The Practical Field Guide for Vulnerability Management

Open-source CTI reports with evidence-labeled assessments, defensive guidance, and SOC-oriented research outputs.


Malware Analysis Tooling

Terminal-native APK analysis pipeline: static analysis via androguard, YARA scanning (20 rules covering Anubis, Cerberus, Joker, SpyNote, Metasploit RAT, Stalkerware, and more), semantic component decoding, entropy-based obfuscation detection, VirusTotal lookup, and AI-generated reports with MITRE ATT&CK mappings and Frida hooks. Supports Claude, OpenAI GPT-4o, Google Gemini, and local Ollama.

📖 Article: Android APK Analysis Tool: AI-Powered Static Malware Analysis in Your Terminal

Step-by-step malware debugger powered by Claude AI. Explains every function — name, summary, parameters, behaviors, MITRE ATT&CK technique, risk level — with optional Frida runtime hooks, memory diffs, unpacking detection, and network traffic capture. See AI-Powered Security for full details.

One-command pipeline for static malware analysis: triage, strings, PE import analysis, unpacking, and LLM-ready reporting.

Malware packer detection and unpacking framework supporting workflows such as detect → unpack → validate.

File metadata and characteristic extraction tool for fast triage of suspicious or unknown files.

Printable-string extraction and analysis utility for malware analysts, reverse engineers, and forensic investigators.

Command-line utility for PE import table analysis with analyst-friendly explanations and flexible output.

General malware analysis repository containing additional tooling and related experimentation.


Security Testing and Offensive Research

Security testing toolkit for generating personalized password wordlists, phone-based combinations, and encoded credential pairs for authorized assessments.

Security testing utility for authorized RTSP authentication assessment and credential brute-force simulation.

Terraform-based deployment of intentionally vulnerable GCP and AWS cloud environments for penetration testing training and security research.


System, Networking, and Education Projects

System configuration inspection tool for quick visibility into Linux host health and configuration state.

Networking-focused Python repository for related experiments and utilities.

LPI 010-160 exam simulator and training project built with a shared question-bank approach.


Writing and Research

I regularly publish technical articles, walkthroughs, and research on Medium, including work on:

  • AI-driven cybersecurity
  • Malware analysis
  • Static-analysis tooling
  • CTI research
  • Security automation
  • Offensive-security workflows

Recent articles:

All articles: https://medium.com/@1200km


Professional Links


Current Focus

I am currently focused on:

  • Building practical AI-powered cybersecurity tools
  • Expanding malware-analysis automation workflows
  • Publishing high-quality CTI research
  • Improving analyst productivity through structured tooling and automation
  • Connecting offensive research with real defensive value

Project Navigation

If you are visiting this profile for the first time, start here:

  1. Android-Malware-Analysis — AI-powered Android APK static analysis (YARA + semantic + VT + Claude/OpenAI/Gemini/Ollama)
  2. AIDebug — AI-assisted malware debugger (Claude + Frida + Capstone)
  3. StratusAI — multi-cloud AI security scanner (AWS + GCP)
  4. AuditAI
  5. cvss_4.0 — CVSS v4.0 BTE enrichment tool (KEV + EPSS + asset profiles)
  6. CTI
  7. Static-malware-Analysis-Orchestrator
  8. Unpacker
  9. PE-Import-Analyzer
  10. String-Analyzer
  11. Basic-File-Information-Gathering-Script
  12. Passwords
  13. RTSP-brute-force-tool
  14. vulnerable-cloud-lab
  15. SystemCheck
  16. Malware_analysis
  17. lpi
  18. Networking

Philosophy

I believe security tooling should be:

  • Practical
  • Transparent
  • Research-driven
  • Analyst-friendly
  • Easy to integrate into real workflows

My goal is to build tools and research that are not only technically strong, but operationally useful.


Cybersecurity Research • Practical Tooling • Intelligence-Driven Engineering

Pinned Loading

  1. Basic-File-Information-Gathering-Script Basic-File-Information-Gathering-Script Public

    This repository contains a versatile Python script, Basic_inf_gathering.py, designed to automate the extraction of critical metadata and characteristics from arbitrary files. It is particularly val…

    Python 2

  2. String-Analyzer String-Analyzer Public

    A powerful Python script to extract and analyze printable strings from binaries. Ideal for malware analysts, reverse engineers, and forensics investigators to uncover hidden indicators and generate…

    Python 4

  3. PE-Import-Analyzer PE-Import-Analyzer Public

    A command-line utility to analyze the import table of PE files. Provides detailed DLL descriptions, API function explanations, and flexible output formats (HTML or plain text). Ideal for malware an…

    Python 2

  4. Static-malware-Analysis-Orchestrator Static-malware-Analysis-Orchestrator Public

    One-command pipeline for basic static malware analysis: triage, strings, PE imports, unpack. Full report and LLM-ready prompt.

    Python 1

  5. Unpacker Unpacker Public

    Modular malware packer detection and unpacking (UPX, ASPack, Themida, VMProtect). PE and ELF. One command: detect → unpack → validate.

    Python 1 2

  6. CTI CTI Public

    Open-source cyber threat intelligence reports: evidence-labeled assessments, SOC-oriented guidance, and defensive research. PDF and HTML with table of contents and working reference links. Handala …

    HTML 2