Deep-HLR : Harnessing The Power Of Defastra For Comprehensive Phone Number Analysis
This script uses the Defastra Deep Phone HLR Check API, aiming to be a tool in fraud prevention and osint research scenarios. The following data points are obtained: retrieves social media accounts suscribed to the number (Amazon, Badoo, Bumble, Microsoft, Skype, Telegram, Twitter, Uber, Xiaomi, Bukalapak, Google Duo, Kakaotalk, TikTok, Google Account, Linkedin, Battlenet, Instagram, CallerID, Yandex, VK, Economic...
Windows Downdate – Mastering The Art Of OS Downgrade Attacks
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title "Windows Downdate: Downgrade Attacks Using Windows Updates". Using Windows Downdate you can downgrade critical OS components, DLLs, Drivers, the NT kernel, the Secure Kernel, the Hyper-V hypervisor, Credential Guard and much...
3proxy – Features, Installation, And Usage Guide
The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic HTTP, SOCKS, and FTP proxy functionalities to advanced features like traffic control, authentication, and encryption, 3proxy offers extensive tools for network security and management. This guide delves into the installation, configuration, and usage of 3proxy, providing a thorough overview...
JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits
JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI high versions, WAF, and RASP. Getting Started Guide Please be sure to take a moment to read this document, which will help you quickly become familiar with JYso! Use documentation Wiki. Download the latest version of Releases. Features JNDI account activation JNDI routing hidden or encrypted JNDI high version...
Findsploit – The Ultimate Tool For Exploit Discovery And Management
Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes "copysploit" to copy any exploit-db exploit to the current directory and "compilesploit" to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). For updates to this script, type findsploit update INSTALLATION ./install.sh USAGE Search for all exploits and modules using...
How To Install/Run – Streamlining OSINT Workflows For Enhanced Capabilities
git clone https://github.com/AnonCatalyst/Odinova && cd Odinova pip install -r requirements.txt --break-system-packages python3 odinova.py -- Support Server Help us grow our discord server or contact support by joining up today! Odinova Digital Tiger: Overview Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-friendly interface to streamline investigative workflows and enhance data analysis capabilities. Documenter: Document Management Purpose: Manages and documents...
CVE-2024-38856 : A Practical Guide To Leveraging Bash And Nuclei
In this comprehensive guide, we delve into the intricacies of CVE-2024-38856, a critical vulnerability that has surfaced in cybersecurity discussions. We will explore practical techniques using bash scripts and the Nuclei scanner to exploit this flaw effectively. This article provides step-by-step instructions to replicate the vulnerability exploitation, offering insights into both the potential impact and the mitigation strategies. By...
NetAlertX – Revolutionizing Network Management nd Security
Get visibility of what's going on on your WIFI/LAN network. Schedule scans for devices, port changes and get alerts if unknown devices or changes are found. Write your own Plugins with auto-generated UI and in-build notification system. Build out and easily maintain your network source of truth (NSoT). Scan Methods, Notifications, Integration, Extension system FeaturesDetails🔍Get visibility of what's going on on your WIFI/LAN...
Project History Of Tartufo – A Comprehensive Update
Explore the evolution of Tartufo, a powerful security tool, through its detailed project history. This article delves into significant updates, from enhanced Python support to critical bug fixes, charting its development from early 2022 to the latest release. Discover how Tartufo has adapted to changing technological landscapes, ensuring robust security solutions for its users. Features: * - Dropped support...
Reporting Security Issues Of tartufo – Vulnerabilities At GoDaddy
We take security very seriously at GoDaddy. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions. Where should I report security issues? In order to give the community time to respond and upgrade, we strongly urge you report all security issues privately. To report a security issue in one of our Open Source...