NimExec: Fileless Command Execution via MS-SCMR
Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes the binary path of a random or given service run by LocalSystem to execute the given command on the target and restores it later via hand-crafted RPC packets instead of WinAPI calls. It sends these packages over SMB2 and...
NetAtlas C2 Server Search: Detecting Command and Control Servers with Netlas API
C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It provides a straightforward and user-friendly CLI interface for searching C2 servers, leveraging the Netlas API to gather data and process it locally. Usage To utilize this terminal utility, you'll need a Netlas API key. Obtain your key from the Netlas website. After acquiring your...
Porch Pirate: A Comprehensive Reconnaissance and OSINT Framework for Postman
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose reconaissance / OSINT framework for Postman. While existing tools are great proof of concepts, they only attempt to identify very specific keywords as "secrets", and in very limited locations, with no consideration to recon beyond secrets. We realized we...
ScrapedIn: Enhancing Red Team Operations with Advanced LinkedIn Data Scraping for Target Company Analysis
Tool to scrape LinkedIn This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering engagements. It performs a company specific search to extract a detailed list of employees who work for the target company. Enter the name of the target company and the tool will help determine the LinkedIn company ID, which will be...
DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results
Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML. Los nodos representan cada uno de los activos escaneados en al red con sus puertos abiertos correspondientes. El filtrado de puertos permite mostrar en el gráfico únicamente los dispositivos que tienen habilitado ese puerto. Usage DESCARGA # git clone --recurse-submodules https://github.com/jor6PS/DrawNmap.git COMANDO # python3...
All-in-One Bug Hunting Setup: The Ultimate Debian Linux Script for Cybersecurity Enthusiasts
In the always-changing world of cybersecurity, it's important to be quick and careful. For Debian Linux users who are really into finding and studying security holes, the "All-in-One Bug Hunting Setup" is a revolutionary bash script. Setting up a full bug hunting environment is made easier by this innovative tool. This makes it easy for both experienced experts and...
Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation
Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge a gap on Windows OS, where post-exploitation frameworks are not readily available unless explicitly installed. In fact, it is entirely written in PowerShell, and can be loaded and executed in memory, just like any other PowerShell script. If you find Amnesiac...
Mantis: The Comprehensive Command-Line Framework for Asset Discovery and Security Scanning
Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level domains as input, then seamlessly progresses to discovering corresponding assets, including subdomains and certificates. The tool performs reconnaissance on active assets and concludes with a comprehensive scan for vulnerabilities, secrets, misconfigurations and phishing domains - all powered by a...
llamafile: Streamlining Access to Large Language Models with Single-File Executables for Local Deployment
llamafile lets you distribute and run LLMs with a single file. (announcement blog post) Our goal is to make open source large language models much more accessible to both developers and end users. We're doing that by combining llama.cpp with Cosmopolitan Libc into one framework that collapses all the complexity of LLMs down to a single-file executable (called a "llamafile") that runs locally on...
Free Threat Intel/IOC Feeds: Maximizing Cybersecurity Efficacy with Open-Source Intelligence Integration
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. The CSV ThreatIntelFeeds is stored in a structured manner based on the Vendor, Description, Category and URL. The vendors offering ThreatIntelFeeds are described below. The following feed categories are available: SSL IP DNS URL MD5 SHA1 SHA256 CVEID The content is served as is. When using the content in a business environment the...