Probable_Subdomains : Subdomains Analysis And Generation Tool

0

Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through - like test.google.com, dev.admin.paypal.com or staging.ceo.twitter.com. Within this repository, you will...

Where to get knowledge and information about the World of Warcraft for beginners

0

Despite the fact that World of Warcraft has more than 10 years of history of active development, the project still remains difficult for players to master, who are just arriving on the servers of Azeroth. WoW, of course, has a built-in training system from developers and a phased development with an introduction to the main mechanics, quests, raids, professions and...

Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup

0

Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that are hosted on a shared hosting...

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

0

ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the results. New Release Features: support windows (ThreatHound.exe) C for Linux based new version available in C also now you can save results in json file or print on screen it as you want by arg 'print' "'yes' to print the...

Faraday : Open Source Vulnerability Management Platform

0

Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you may focus on discovering vulnerabilities while we help you with the rest. Just use it in your terminal and get your work organized on the run. Faraday was made to let you take advantage of...

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

0

Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py Options: -h, --help show this help message and exit -u URL, --url=URL Supply the login page, for example: -u http://192.168.98.200/login.php' -s , --success Success message when upload an image, example: -s 'Image uploaded successfully.' -e , --extension Provide server backend extension, for example: --extension php...

OffensivePipeline : To Download And Build C# Tools, To Improve Their Evasion For Red Team Exercises

0

OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use of OffensivePipeline is to download a tool from a Git repository, randomise certain values in the project, build it, obfuscate the resulting binary and generate a shellcode. Features Currently only supports C# (.Net Framework) projects Allows to clone...

Misp-Extractor : Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)

0

Misp-Extractor is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files. MISP Extractor This code connects to a given MISP (Malware Information Sharing Platform) server and parses a given number of events, writing the IP addresses, URLs, and...

Invoke-Transfer : PowerShell Clipboard Data Transfer

0

Invoke-Transfer is a PowerShell Clipboard Data Transfer. This tool helps you to send files in highly restricted environments such as Citrix, RDP, VNC, Guacamole.. using the clipboard function. As long as you can send text through the clipboard, you can send files in text format, in small Base64 encoded chunks. Additionally, you can transfer files from a screenshot, using the native...

Web-Hacking-Playground : Web Application With Vulnerabilities Found In Real Cases, Both In Pentests And In Bug Bounty Programs

0

Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests and in Bug Bounty programs. The objective is that users can practice with them, and learn to detect and exploit them. Other topics of interest will also be addressed, such as: bypassing filters by creating custom payloads, executing chained attacks...