VAST - Visibility Across Space And Time
The network telemetry engine for data-driven security investigations.Getting Started— Installation— Documentation— Development— Changelog— License and Scientific UseChat with us on Gitter, or join us...
View ArticleShort story about Clubhouse user scraping and social graphs
TL;DRDuring this RedTeam testing, Hexway team used Clubhouse as a social engineering tool to find out more about their client’s employees.UPDATE:While Hexway were preparing this article for...
View ArticleAPSoft-Web-Scanner-v2 - Powerful Dork Searcher And Vulnerability Scanner For...
APSoft Webscanner Version 2new version of APSoft Webscanner Version 1Software picturesWhat can i do with this ?with this software, you will be able to search your dorks in supported search engines and...
View ArticleByeIntegrity-UAC - Bypass UAC By Hijacking A DLL Located In The Native Image...
Bypass User Account Control (UAC) to gain elevated (Administrator) privileges to run any program at a high integrity level. RequirementsAdministrator accountUAC notification level set to default or...
View ArticleSnuffleupagus - Security Module For Php7 And Php8 - Killing Bugclasses And...
Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!Snuffleupagus is a PHP 7+ and 8+ module designed to drastically raise the cost of attacks against websites, by...
View Article3klCon - Automation Recon Tool Which Works With Large And Medium Scope
Full Automation Recon tool which works with Small and Medium scopes.Ù‘It's recommended to use it on VPS, it'll discoversecrets and searching for vulnerabilitiesSo, Welcome and let's deep into it...
View ArticleR77-Rootkit - Fileless Ring 3 Rootkit With Installer And Persistence That...
Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes:Files, directories, junctions, named pipes, scheduled tasksProcessesCPU usageRegistry keys & valuesServicesTCP...
View ArticleMubeng - An Incredibly Fast Proxy Checker And IP Rotator With Ease
An incredibly fast proxy checker& IP rotator with ease.FeaturesProxy IP rotator: Rotates your IP address for every specific request.Proxy checker: Check your proxy IP which is still alive.All...
View ArticleHttpx - A Fast And Multi-Purpose HTTP Toolkit Allows To Run Multiple Probers...
httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.FeaturesSimple and...
View ArticleCIMplant - C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote...
C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session.Note: Some commands will use PowerShell in combination with WMI,...
View ArticleRed-Kube - Red Team K8S Adversary Emulation Based On Kubectl
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's perspective.The commands are either passive for data collection and...
View ArticleDFIR-O365RC - PowerShell Module For Office 365 And Azure AD Log Collection
PowerShell module for Office 365 and Azure AD log collectionModule description The DFIR-O365RC PowerShell module is a set of functions that allow the DFIR analyst to collect logs relevant for Office...
View ArticleEyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots
Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like...
View ArticleCorsair_Scan - A Security Tool To Test Cross-Origin Resource Sharing (CORS)
Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources on a web page to be requested from another domain...
View ArticleMediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel...
Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a "mediator" server that bridges the connections. This removes the need for the operator/handler to set...
View ArticleMsldap - LDAP Library For Auditing MS AD
msldapLDAP library for MS ADDocumentationAwesome documentation here!FeaturesComes with a built-in console LDAP clientAll parameters can be conrolled via a conveinent URL (see below)Supports integrated...
View ArticleGhidra-Evm - Module For Reverse Engineering Smart Contracts
In the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant amount of stolen funds due to programming mistakes. Since smart contracts, once...
View ArticleIPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often...
IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private...
View ArticleEtherblob-Explorer - Search And Extract Blob Files On The Ethereum Blockchain...
Search and extract blob files on the Ethereum network using Etherscan.io API.IntroductionEtherBlob Explorer is a tool intended for researchers, analysts, CTF players or anyone curious enough wanting to...
View ArticleABPTTS - TCP Tunneling Over HTTP/HTTPS For Web Application Servers
A Black Path Toward The Sun(TCP tunneling over HTTP for web application servers)https://www.blackhat.com/us-16/arsenal.html#a-black-path-toward-the-sunBen Lincoln, NCC Group, 2016ABPTTS uses a Python...
View Article