MailChecker: Revolutionizing Email Validation Across Languages with Advanced Domain Database
In a modern world where email is so important, it's very important to keep it safe. MailChecker becomes a key option because it can check emails in more than one language and in more advanced ways. It does more than just check the format of email addresses to find temporary and spam ones. It has a library of over...
AcuAutomate: Streamlining Pentesting and Bug Hunting with Advanced Acunetix Integration
AcuAutomate is an unofficial Acunetix CLI tool that simplifies automated pentesting and bug hunting across extensive targets. It's a valuable aid during large-scale pentests, enabling the easy launch or stoppage of multiple Acunetix scans simultaneously. Additionally, its versatile functionality seamlessly integrates into enumeration wrappers or one-liners, offering efficient control through its pipeline capabilities. Installation git clone https://github.com/danialhalo/AcuAutomate.git cd AcuAutomate chmod +x AcuAutomate.py pip3 install -r...
py-amsi: Streamlining Malware Detection in Python with the Windows AMSI API
py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI is an interface native to Windows that allows applications to ask the antivirus installed on the system to analyse a file/string. AMSI is not tied to Windows Defender. Antivirus providers implement the AMSI interface to receive calls from applications....
Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques
ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating/duplicating process and thread tokens. Why reinvent the wheel with yet another privilege escalation utility? This was a combined effort between avoiding AV alerts using Metasploit and furthering my research into privilege escalation methods using tokens. In brief: My main goal here was to learn...
Enhancing macOS Security: A Guide to Red Canary Mac Monitor
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system troubleshooting. Harnessing Apple Endpoint Security (ES), it collects and enriches system events, displaying them graphically, with an expansive feature set designed to surface only the events that are relevant to you. The telemetry collected includes process, interprocess, and file events...
Afuzz – An automated web path fuzzing tool
Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out to be a useful tool in this search because it provides an automatic way to test web paths that is perfect for bug reward projects. Afuzz was created by RapidDNS and is unique because it can intelligently adapt to...
PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques
Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a command-line password cracking tool made in Python, is the best in its field and has many advanced features that make it easy to decode passwords. This detailed guide goes over all of PassBreaker's features, such as wordlist-based attacks and...
WinDiff: A Comprehensive Tool for Windows Binary Comparison and Analysis
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the operating system. The binary database is automatically updated to include information from the latest Windows updates (including Insider Preview). It was inspired by ntdiff and made possible with the help of Winbindex. How It Works WinDiff is made of two...
Aladdin: Advanced .NET Payload Generation and Execution Techniques
.-. [.-''-., | //`~) (<| 0|>_ "; _"/ \_ _, ...
T3SF: A Quickstart Guide to Modular Event Orchestration
T3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events list (MSEL) together with a set of rules defined for each exercise (optional) and a configuration that allows defining the parameters of the corresponding platform. The main module performs the communication with the specific module (Discord, Slack, Telegram, etc.)...