LetsMapYourNetwork - Tool To Visualise Your Physical Network In Form Of Graph...
It is utmost important for any security engineer to understand their network first before securing it and it becomes a daunting task to have a ‘true’ understanding of a widespread network. In a mid to...
View ArticleRevshellgen - Reverse Shell Generator Written In Python.
Standalone python script for generating reverse shells easily and automating the boring stuff like URL encoding the command and setting up a listener.Downloadgit clone...
View ArticleActiveReign - A Network Enumeration And Attack Toolset
BackgroundA while back I was challenged to write a discovery tool with Python3 that could automate the process of finding sensitive information on network file shares. After writing the entire tool...
View ArticlefileGPS - A Tool That Help You To Guess How Your Shell Was Renamed After The...
IntroductionWhen you upload a shell on a web-server using a file upload functionality, usually the file get renamed in various ways in order to prevent direct access to the file, RCE and file...
View ArticlegitGraber - Tool To Monitor GitHub To Search And Find Sensitive Data For...
gitGraber is a tool developed in Python3 to monitor GitHub to search and find sensitive data for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku,...
View ArticleBotb - A Container Analysis And Exploitation Tool For Pentesters And Engineers
BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly with common CI/CD technologies.What does it do?BOtB is a CLI tool...
View ArticleMetame - Metame Is A Metamorphic Code Engine For Arbitrary Executables
metame is a simple metamorphic code engine for arbitrary executables.From Wikipedia:Metamorphic code is code that when run outputs a logically equivalent version of its own code under some...
View ArticleGrapl - Graph Platform For Detection And Response
Grapl is a Graph Platform for Detection and Response.For a more in depth overview of Grapl, read this.In short, Grapl will take raw logs, convert them into graphs, and merge those graphs into a Master...
View ArticlePyrdp - RDP Man-In-The-Middle And Library For Python3 With The Ability To...
PyRDP is a Python 3 Remote Desktop Protocol (RDP) Man-in-the-Middle (MITM) and library.It features a few tools:RDP Man-in-the-Middle Logs credentials used when connectingSteals data copied to the...
View ArticleAnteater - CI/CD Gate Check Framework
Anteater is an open framework to prevent the unwanted merging of nominated strings, filenames, binaries, depreciated functions, staging enviroment code / credentials etc. Anything that can be specified...
View ArticleShodan-Eye - Tool That Collects All The Information About All Devices...
This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview.The types of devices...
View ArticleDetExploit - Software That Detect Vulnerable Applications, Not-Installed OS...
DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user.As we know, most of cyberattacks uses vulnerability that is...
View ArticleStegify - Go Tool For LSB Steganography, Capable Of Hiding Any File Within An...
stegify is a simple command line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit)...
View ArticleTinkererShell - A Simple Python Reverse Shell Written Just For Fun
A simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some basic features like keylogging and AES encrypted communications.Supported...
View ArticlePostShell - Post Exploitation Bind/Backconnect Shell
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be...
View ArticlePrivExchange - Exchange Your Privileges For Domain Admin Privs By Abusing...
POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin.RequirementsThese tools require impacket. You can install it from pip with pip install impacket, but it is...
View ArticleACT Platform - Open Platform For Collection And Exchange Of Threat...
Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security Authority (NSM), KraftCERT and Nordic...
View ArticleStardox - Github Stargazers Information Gathering Tool
Stardox is an advanced github stargazersinformation gathering tool. It scraps Github for information and display them in list tree view.It can be used for collecting information of your's/someones...
View ArticleProject iKy v2.2.0 - Tool That Collects Information From An Email And Shows...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the Gitlab Page of the ProjectVideoInstallationClone repositorygit clone...
View ArticleAura-Botnet - A Super Portable Botnet Framework With A Django-based C2 Server
Aura BotnetC2 ServerThe botnet's C2 server utilizes the Django framework as the backend. It is far from the most efficient web server, but this is offset by the following:Django is extremely portable...
View Article