Neurax - A Framework For Constructing Self-Spreading Binaries
A framework that aids in creation of self-spreading softwareRequirementsgo get -u github.com/redcode-labs/Coldfirego get -u github.com/yelinaung/go-haikunatorNew in v. 2.0New wordlist mutators +...
View ArticleBlueCloud - Cyber Range including Velociraptor + HELK system with a Windows...
Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with one registered Windows endpoint in Azure or AWS. A collection of...
View ArticleInteractsh - An OOB Interaction Gathering Server And Client Library
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external interactions, For example - Blind SQLi, Blind CMDi, SSRF,...
View ArticleiOS Malicious Bit Hunter - A Malicious Plug-In Detection Eng ine For iOS...
iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime, and can perform...
View ArticleNebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance,...
Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each functionality. As of April 2021, it only covers AWS, but is currently an...
View ArticlepyWhat - Identify Anything. Easily Lets You Identify Emails, IP Addresses,...
The easiest way to identify anythingpip3 install pywhat && pywhat --helpWhat is this?Imagine this: You come across some mysterious text5f4dcc3b5aa765d61d8327deb882cf99 and you wonder what it...
View ArticleEmailFinder - Search Emails From A Domain Through Search Engines
_______ _______ _ ______ _______ ( ____ \( ____ \( ( /|( __ \ ( ____ )| ( \/| ( \/| \ ( || ( \ )| ( )|| (__ | (__ | \ | || | ) || (____)|| __) | __) | (\ \) || | | || __)| ( | ( | | \ || | ) || (\ ( |...
View ArticleRedpill - Assist Reverse Tcp Shells In Post-Exploration Tasks
Project DescriptionThe redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements we need to use unconventional ways to access target system, such as...
View ArticledefenselessV1 - Just Another Vulnerable Web Application
Defenseless is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of this application is to create security awareness among developers and new...
View ArticleA2P2V - Automated Attack Path Planning and Validation
Automated Attack Path Planning and Validation (A2P2V) is a planning and cyber-attack tool that provides the capability for users to determine a set of ranked attack sequences given a specific attacker...
View ArticleTChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services...
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services display name and WMI by smuggling the malicious binary as base64 chunks...
View ArticleGundog - Guided Hunting In Microsoft 365 Defender
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at the moment.FunctionalityYou provide an AlertID (you might received via Email...
View ArticleAggrokatz - An Aggressor Plugin Extension For Cobalt Strike Which Enables...
aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version of aggrokatz allows pypykatz to parse LSASS dump files and...
View ArticleVolatility GUI - GUI For Volatility Forensics Tool
This is a GUI for Volatilityforensics tool written in PyQT5Prerequisites:1- Installed version of Volatility.2- Install PyQT5.sudo apt-get install python3-pyqt53- Download Volatility...
View ArticlePPLdump - Dump The Memory Of A PPL With A Userland Exploit
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post - for dumping the memory of any PPL as an administrator.I wrote two blog...
View ArticleJoern - Open-source Code Analysis Platform For C/C++/Java Based On Code...
Joern's Documentation is available here: https://docs.joern.io/homeQuick Installationwget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x...
View ArticleKconfig-Hardened-Check - A Tool For Checking The Hardening Options In The...
MotivationThere are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros. We have to enable these options ourselves to make our systems more secure.But...
View ArticleRustcat - Netcat Alternative
AboutRustcat is a port listener that can be used for different purposes. It is basically like netcat but with fewer optionsWhy use Rustcat?Serves it purpose of listening to portsHas command historyIt...
View ArticleFalconEye - Real-time detection software for Windows process injections
FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch process injections as they are happening (real-time). Since FalconEye...
View ArticleIoccheck - A Tool For Simplifying The Process Of Researching IOCs
A tool for simplifying the process of researching file hashes, IP addresses, and other indicators of compromise (IOCs).FeaturesLook up hashes across multiple threat intelligence services, from a single...
View Article