SecurityNotFound - 404 Page Not Found Webshell
Clone me!Clone or download the project:git clone https://github.com/CosasDePuma/SecurityNotFound.git SecurityNotFoundcd SecurityNotFound"Installation"The src/404.php file should be located on the...
View ArticleDumpsterFire - "Security Incidents In A Box!" A Modular, Menu-Driven,...
DumpsterFire Toolset - "Security Incidents In A Box!"The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily...
View ArticleSyhunt Community 6.7 - Web And Mobile Application Scanner
Syhunt Community is a web and now mobile application security scanner. Syhunt is able to scan any kind of application source code for potential security vulnerabilities, pinpointing the exact lines of...
View ArticleTerraform AWS Secure Baseline - Terraform Module To Set Up Your AWS Account...
Terraform Module RegistryA terraform module to set up your AWS account with the reasonably secure configuration baseline. Most configurations are based on CIS Amazon Web Services Foundations v1.2.0.See...
View ArticleRecomposer - Randomly Changes Win32/64 PE Files For 'Safer' Uploading To...
Ever have that not so safe feeling uploading your malware binaries to VirusTotal or other AV sites because you can look up binaries by hashes? (Example: https://github.com/mubix/vt-notify)Feel somewhat...
View ArticleCryptonDie - A Ransomware Developed For Study Purposes
CryptonDie is a ransomware developed for study purposes.Options --key key used to encrypt and decrypt files, default is random string(recommended) --dir Home directory for the attack, default is /...
View ArticleSub.Sh - Online Subdomain Detect Script
Online Subdomain Detect Script.USAGEÂ Scriptbash sub.sh webscantest.com ./sub.sh webscantest.comCurlcurl -s -L https://raw.githubusercontent.com/cihanmehmet/sub.sh/master/sub.sh | bash -s...
View ArticleLockdoor Framework - A Penetration Testing Framework With Cyber Security...
Lockdoor Framework : A Penetration Testing Framework With Cyber Security Resources.09/2019 : 1.0BetaInformation Gathring Tools (21)Web Hacking Tools(15)Reverse Engineering Tools (15)Exploitation Tools...
View ArticleGiveMeSecrets - Use Regular Expressions To Get Sensitive Information From A...
Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).DependenciesYou only need to have python 3.6 or higher installed to launch this script. In addition you...
View ArticleSQLMap v1.3.10 - Automatic SQL Injection And Database Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleThreadBoat - Program Uses Thread Execution Hijacking To Inject Native...
Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application.With Thread Hijacking, it allows the hijacker.exe program to suspend a thread within the target.exe program...
View ArticleManaTI - A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts
Machine Learning for Threat Intuitive AnalysisThe goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery of new security...
View ArticleFenrir - Simple Bash IOC Scanner
Fenrir is a simple IOC scanner bash script. It allows scanning Linux/Unix/OSX systems for the following Indicators of Compromise (IOCs): Hashes MD5, SHA1 and SHA256 (using md5sum, sha1sum, sha -a 256)...
View ArticleDNS Rebinding Tool - DNS Rebind Tool With Custom Scripts
Inspired by @tavisioThis project is meant to be an All-in-one Toolkit to test further DNS rebinding attacks and my take on understanding these kind of attacks. It consists of a web server and pseudo...
View ArticleUserrecon-Py v2.0 - Username Recognition On Various Websites
Username recognition on various websites.InstallationWith pip3# Linuxsudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git --upgradeuserrecon-py --helpBuild from source# Linuxgit clone...
View ArticleB2R2 - Collection Of Useful Algorithms, Functions, And Tools For Binary Analysis
B2R2 is a collection of useful algorithms, functions, and tools for binary analysis, written purely in F# (in .NET lingo, it is purely managed code). B2R2 has been named after R2-D2, a famous fictional...
View ArticleTarnish - A Chrome Extension Static Analysis Tool To Help Aide In Security...
tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular grunt work and helps you quickly identify potential security...
View ArticlePenta - Open Source All-In-One CLI Tool To Automate Pentesting
Penta is is Pentest automation tool using Python3.(Future!) It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers.InstallationInstall...
View ArticleFATT - A Script For Extracting Network Metadata And Fingerprints From Pcap...
FATT is a script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic. The main use-case is for monitoring honeypots, but you...
View Articlebox.js - A Tool For Studying JavaScript Malware
A utility to analyze malicious JavaScript.InstallationSimply install box-js from npm:npm install box-js --globalUsageLooking to use box-js with Cuckoo? Use cuckoo-package.py as an analysis...
View Article