AMSI-Bypass-HWBP : A Tool For Evading AMSI Detection
AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware by scanning scripts and files for malicious content. However, attackers often seek to bypass AMSI to execute malicious scripts undetected. One such tool for bypassing AMSI is AMSI-Bypass-HWBP, which utilizes a small debugger to manipulate the behavior of AMSI. Functionality Of AMSI-Bypass-HWBP AMSI-Bypass-HWBP operates by creating...
BurpSuite-Xkeys : Mastering Key And Token Extraction For Web Security
Xkeys is a Burp Suite extension designed to extract interesting strings such as keys, secrets, and tokens from web pages. It operates as a passive scanner, identifying these strings and listing them as information issues within Burp Suite. This article will delve into the setup, usage, and functionality of the Xkeys extension. Setup And Requirements To use Xkeys, you need to...
DEDSEC_BOTNET : A Comprehensive Tool For Penetration Testing And Ethical Hacking
DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is intended for use in penetration testing, ethical hacking, and educational purposes to simulate and study botnet attacks. The tool allows users to inject malicious payloads into legitimate Python code or other software, enabling the creation of stealthy and persistent botnets. Key Features Of DEDSEC_BOTNET Botnet Payload...
JS Snitch : Hidden Secrets In JavaScript Files
JS Snitch is a powerful command-line tool designed to scan remote JavaScript files for potential secrets or credentials. It leverages the capabilities of Trufflehog and Semgrep to automate the detection of leaked API keys, tokens, or other sensitive information hidden in external JavaScript files. This tool is particularly useful for penetration testers, bug bounty hunters, and security engineers seeking...
RunAs-Stealer : A Credential Stealing Tool
RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart Keylogging, and Remote Debugging. This tool operates stealthily in the background, requiring manual termination via Task Manager. Techniques Used Hooking CreateProcessWithLogonW: This method involves intercepting the CreateProcessWithLogonW function, which is used to create a new process with specific credentials. By hooking into...
IDOR Scanner : A Comprehensive Tool For Detecting Insecure Direct Object References
The IDOR Scanner is a powerful Burp Suite extension designed to identify potential Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. Written in Python, it leverages both passive and active scanning techniques to detect and confirm IDOR issues. Key Features Detection of Numeric Fields: The extension scans various parts of HTTP requests and responses for numeric fields, including URL paths,...
SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool
SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug bounty hunters, and security researchers. Version 1.3.1 of SubCat continues to build on its predecessors by offering a robust set of features that enhance its performance and versatility. Key Features Of SubCat v1.3.1 Fast Enumeration: SubCat leverages high-performance resolution and wildcard...
Mininterface : Simplifying GUI, TUI, CLI, And Config File Management
Mininterface is a powerful Python library designed to simplify the creation of user interfaces for applications. It allows developers to easily integrate GUI, TUI, CLI, and config file management into their projects with minimal code overhead. This article explores the features and functionalities of Mininterface, highlighting its ease of use and versatility. Key Features GUI and TUI Support: Mininterface automatically generates...
NFCGate : A Comprehensive NFC Traffic Analysis Tool
NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure Mobile Networking Lab at TU Darmstadt, it serves as a valuable tool for security researchers aiming to reverse-engineer protocols or assess their security against traffic modifications. This article delves into the features, usage, and requirements of NFCGate. Features On-device Capture: NFCGate...
ShellOpsLog : A Lightweight Command Logger
ShellOpsLog is a versatile tool designed to capture and log all executed commands during various operations, such as red and purple team engagements. It provides a lightweight solution for tracking command history without recording their output. The logged commands are saved in a CSV file, making it easy to analyze and include in client deliverables or internal reviews. Key Features Portability:...