Thunderstorm : Modular Framework To Exploit UPS Devices

0

Thunderstorm is a modular framework to exploit UPS devices. For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future. CVE Thunderstorm is currently capable of exploiting the following CVE: CVE-2022-47186 – Unrestricted file Upload # CVE-2022-47187 – Cross-Site Scripting via File upload # CVE-2022-47188 – Arbitrary local file read...

RedTeam-Physical-Tools : Red Team Toolkit Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry

0

Red Team Toolkit is a curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry. Red Team - Physical Security - Covert Entry - EDC Disclaimer: I am not responsible for anyone using any information in this post for any illegal activities. Getting caught with possession of burglary tools will...

X-force : IBM Security Utilitary Library In Python

0

X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries Install pip3 install XForce Use Using you API_KEY make a basic authentication. See . After make a base64 code → Key + : + Password: printf "d2f5f0f9-2995-42c6-b1dd-4c92252da129:06c41d5e-0604-4c7c-a599-300c367d2090" | base64 # ZDJmNWYwZjktMjk5NS00MmM2LWIxZGQtNGM5MjI1MmRhMTI5OjA2YzQxZDVlLTA2MDQtNGM3Yy1hNTk5LTMwMGMzNjdkMjA5MAo= Using API_KEY, call functions. See for key storage Call functions import XForce # Args: 1 - Term of search, 2...

Cortex-XDR-Config-Extractor : Cortex XDR Config Extractor

0

Cortex-XDR-Config-Extractor tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool its possible to parse the Database Lock Files of the Cortex XDR Agent by Palo Alto Networks and extract Agent Settings, the Hash and Salt of the Uninstall Password, as well as possible Exclusions. Supported Extractions Uninstall Password Hash & Salt Excluded Signer...

APKHunt : Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework

0

APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code. With APKHunt, mobile software architects or developers can conduct thorough code reviews to...

IpGeo : Tool To Extract IP Addresses From Captured Network Traffic File

0

IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing details about the geolocation of each ip in the packets. The report contains: Country: Country Code. Region Region Name City Zip Latitude Longitude Timezone Isp Org Ip Installation Use the package manager pip3 to install required modules. pip3 install colorama pip3 install requests pip3 install pyshark If you are not using Kali or ParrotOs or any other penetration...

SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

0

SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. Google dorking is a method of using advanced search operators and keywords to uncover sensitive information that is publicly available on the internet. SXDork offers a wide range of options to search for different types of dorks, such as...

CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

0

CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created. CVE Vulnerability Information Downloader Common Vulnerability Scoring System (CVSS) is a free...

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

0

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is valid because most of the companies block unknown traffic so gmail traffic is valid and allowed...

Tracgram : Use Instagram location features to track an account

0

Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple: 1. Download this repository 2. Go through the instalation steps 3. Change the parameters in the tracgram main method directly: + Mandatory: - NICKNAME: your username on Instagram ...