SSH-Snake : Automated SSH-Based Network Traversal
SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the objective of creating a comprehensive map of a network and its dependencies, identifying to what extent a network can be compromised using SSH and SSH private keys starting from a particular system. SSH-Snake can automatically reveal the relationship between systems...
CloudMiner – Unleashing Free Computing Power Within Azure Automation
CloudMiner represents a groundbreaking approach to leveraging Azure Automation service without incurring any costs. Designed for educational and research purposes, this tool cleverly navigates through the service's upload module/package flow, allowing users to execute code for up to three hours per session, completely free of charge. Despite being reported to Microsoft, the service's behavior remains unchanged, opening up new...
SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python
SqliSniper is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers. It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency. Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord notification functionality. Key Features Time-Based Blind...
WEB-Wordlist-Generator : Strengthening Your Web Application’s Defense Against Cyber Threats
In the digital age, securing web applications against cyber attacks is paramount. The WEB-Wordlist-Generator emerges as a crucial tool, designed to scan web applications and generate targeted wordlists. This allows for proactive measures to be taken, enhancing security and preventing potential breaches. With its easy installation and versatile usage options, it's a must-have in any cybersecurity toolkit. NOTE : You...
NullSection : A Revolutionary Anti-Reversing Tool For Enhancing Software Security
NullSection emerges as a cutting-edge tool designed to fortify software against reverse engineering attempts. By employing a novel technique that overwrites section headers with null bytes, it effectively renders ELF binaries, including potentially malicious .ko rootkits, impervious to analysis by popular decompilers like Ghidra and IDA. This article delves into the installation process, advantages, and responsible usage of NullSection,...
Mr.Handler – The Ultimate Tool For Linux Security Incident Response And System Analysis
MR.Handler is a specialized tool designed for responding to security incidents on Linux systems. It connects to target systems via SSH to execute a range of diagnostic commands, gathering crucial information such as network configurations, system logs, user accounts, and running processes. At the end of its operation, the tool compiles all the gathered data into a comprehensive HTML...
AzSubEnum – Azure Service Subdomain Enumeration
AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. This tool is designed to meticulously search and identify subdomains associated with various Azure services. Through a combination of techniques and queries, AzSubEnum delves into the Azure domain structure, systematically probing and collecting subdomains related to a diverse range of Azure services. How It Works? AzSubEnum operates by leveraging DNS...
SwaggerSpy – Elevating API Security Through OSINT On SwaggerHub
SwaggerSpy is a tool designed for automated Open Source Intelligence (OSINT) on SwaggerHub. This project aims to streamline the process of gathering intelligence from APIs documented on SwaggerHub, providing valuable insights for security researchers, developers, and IT professionals. What Is Swagger? Swagger is an open-source framework that allows developers to design, build, document, and consume RESTful web services. It simplifies API...
UAC-BOF-Bonanza : Elevating Access With Advanced Bypass Methods
This repository serves as a collection of public UAC bypass techniques that have been weaponized as BOFs. A single module which integrates all techniques has been provided to use the BOFs via the Havoc C2 Framework. A extension.json file has also been provided for each bypass technique for use in Sliver. See the section of the readme titled Greetz/Credit for all references/code that was used...
XC : A Comprehensive Guide To Netcat – Like Reverse Shell For Linux And Windows
A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation, port forwarding, and plugin execution, XC offers versatile capabilities for penetration testers and ethical hackers. This article provides a detailed overview and setup guide for leveraging XC's functionalities effectively. Netcat like reverse shell for Linux & Windows. Features Windows Usage: └ Shared Commands:...